Lookup for vulnerable packages by Package URL.

GET /api/packages/84835?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
    "type": "ebuild",
    "namespace": "dev-java",
    "name": "icedtea-bin",
    "version": "7.2.6.10",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "7.2.6.11",
    "latest_non_vulnerable_version": "8.252_p09",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60254?format=api",
            "vulnerability_id": "VCID-1yfj-cdt7-1yhf",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83327",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83311",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8337",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83376",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83351",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83297",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83361",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97733"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252",
                    "reference_id": "1443252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526",
                    "reference_id": "CVE-2017-3526",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3526"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yfj-cdt7-1yhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60252?format=api",
            "vulnerability_id": "VCID-5y7y-27dr-87g9",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8982",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89868",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89867",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97727"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455",
                    "reference_id": "1443455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512",
                    "reference_id": "CVE-2017-3512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3512"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-27dr-87g9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api",
            "vulnerability_id": "VCID-6383-1rzy-9kcr",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59436",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59584",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59502",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59533",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906",
                    "reference_id": "1413906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95509",
                    "reference_id": "95509",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95509"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3252"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60251?format=api",
            "vulnerability_id": "VCID-69zc-r9uw-jke5",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81687",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81617",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81628",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81648",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.817",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97731"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007",
                    "reference_id": "1443007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511",
                    "reference_id": "CVE-2017-3511",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3511"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69zc-r9uw-jke5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=api",
            "vulnerability_id": "VCID-6xgm-xhae-3bbv",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67129",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923",
                    "reference_id": "1413923",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95530",
                    "reference_id": "95530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95530"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-5549"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api",
            "vulnerability_id": "VCID-7ez7-vdry-wbep",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562",
                    "reference_id": "1413562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95525",
                    "reference_id": "95525",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95525"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3289"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api",
            "vulnerability_id": "VCID-ar8p-z4ww-wuau",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98941",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98943",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98952",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9895",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955",
                    "reference_id": "1413955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/41145/",
                    "reference_id": "41145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/41145/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95488",
                    "reference_id": "95488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95488"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py",
                    "reference_id": "CVE-2017-3241",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/",
                    "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3241"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api",
            "vulnerability_id": "VCID-c7sa-v6cu-d3ex",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7939",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7933",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7936",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764",
                    "reference_id": "1413764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95521",
                    "reference_id": "95521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95521"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-5547"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60257?format=api",
            "vulnerability_id": "VCID-c9qw-1g2p-qqcr",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59432",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59457",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59423",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59474",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59487",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5949",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-07-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://source.android.com/security/bulletin/2017-07-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97745"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068",
                    "reference_id": "1443068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544",
                    "reference_id": "CVE-2017-3544",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3544"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9qw-1g2p-qqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api",
            "vulnerability_id": "VCID-e2zb-3859-qfe6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78536",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78543",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78573",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78588",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78594",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911",
                    "reference_id": "1413911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95506",
                    "reference_id": "95506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95506"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-5546"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60256?format=api",
            "vulnerability_id": "VCID-fsu1-jy1q-qkh1",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7263",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72638",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72655",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72632",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72672",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72685",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72708",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72691",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97752"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097",
                    "reference_id": "1443097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539",
                    "reference_id": "CVE-2017-3539",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3539"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsu1-jy1q-qkh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60255?format=api",
            "vulnerability_id": "VCID-ft81-49v3-a7cr",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70721",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70737",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70775",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70813",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70798",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97740"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083",
                    "reference_id": "1443083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533",
                    "reference_id": "CVE-2017-3533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3533"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ft81-49v3-a7cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api",
            "vulnerability_id": "VCID-ftnn-eurn-wydw",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74981",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74991",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74977",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74968",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653",
                    "reference_id": "1413653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95566",
                    "reference_id": "95566",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95566"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3261"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37027?format=api",
            "vulnerability_id": "VCID-hvzr-km7c-cqgz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83177",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83193",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83243",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83207",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83206",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83253",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83247",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562",
                    "reference_id": "1414562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95576",
                    "reference_id": "95576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95576"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3260"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvzr-km7c-cqgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api",
            "vulnerability_id": "VCID-k3pa-xdxn-ubbg",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69191",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69285",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69209",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69227",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717",
                    "reference_id": "1413717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95563",
                    "reference_id": "95563",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95563"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3231"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api",
            "vulnerability_id": "VCID-qs1s-6yjm-jye5",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72038",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71993",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72054",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037798",
                    "reference_id": "1037798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037798"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882",
                    "reference_id": "1413882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html",
                    "reference_id": "2017-02-01.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://source.android.com/security/bulletin/2017-02-01.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95512",
                    "reference_id": "95512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95512"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-5552"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60253?format=api",
            "vulnerability_id": "VCID-rudc-b743-5uh8",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78856",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78902",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78863",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78873",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78904",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78928",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78912",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97729"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469",
                    "reference_id": "1443469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514",
                    "reference_id": "CVE-2017-3514",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3514"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rudc-b743-5uh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api",
            "vulnerability_id": "VCID-snqh-ebq3-hubn",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67129",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920",
                    "reference_id": "1413920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95559",
                    "reference_id": "95559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95559"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-5548"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api",
            "vulnerability_id": "VCID-tc8v-xrjj-hucq",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554",
                    "reference_id": "1413554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95533",
                    "reference_id": "95533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95533"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3272"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api",
            "vulnerability_id": "VCID-v64t-4c46-3bhj",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8283",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82894",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82904",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82888",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8286",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583",
                    "reference_id": "1413583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95498",
                    "reference_id": "95498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95498"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3253"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=api",
            "vulnerability_id": "VCID-x54g-mhs4-mug4",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97356",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97377",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97362",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97366",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97367",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383",
                    "reference_id": "1369383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-23",
                    "reference_id": "ASA-201609-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-24",
                    "reference_id": "ASA-201609-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-24"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-29",
                    "reference_id": "AVG-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-29"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-30",
                    "reference_id": "AVG-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-16",
                    "reference_id": "GLSA-201612-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201612-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1940",
                    "reference_id": "RHSA-2016:1940",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1940"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0462",
                    "reference_id": "RHSA-2017:0462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2708",
                    "reference_id": "RHSA-2017:2708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2709",
                    "reference_id": "RHSA-2017:2709",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2709"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2710",
                    "reference_id": "RHSA-2017:2710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3239",
                    "reference_id": "RHSA-2017:3239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3239"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3240",
                    "reference_id": "RHSA-2017:3240",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3240"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2123",
                    "reference_id": "RHSA-2018:2123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1245",
                    "reference_id": "RHSA-2019:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2859",
                    "reference_id": "RHSA-2019:2859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2859"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0451",
                    "reference_id": "RHSA-2020:0451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3842",
                    "reference_id": "RHSA-2020:3842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3842"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0308",
                    "reference_id": "RHSA-2021:0308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0308"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438",
                    "reference_id": "RHSA-2021:2438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2438"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3087-1/",
                    "reference_id": "USN-3087-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3087-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3270-1/",
                    "reference_id": "USN-3270-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3270-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3372-1/",
                    "reference_id": "USN-3372-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3372-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2016-2183"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60250?format=api",
            "vulnerability_id": "VCID-zzqd-253d-ykca",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72389",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72343",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72367",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72344",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72348",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97737"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052",
                    "reference_id": "1443052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509",
                    "reference_id": "CVE-2017-3509",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api",
                    "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
                }
            ],
            "aliases": [
                "CVE-2017-3509"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zzqd-253d-ykca"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10"
}