Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/84835?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "type": "ebuild", "namespace": "dev-java", "name": "icedtea-bin", "version": "7.2.6.10", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "7.2.6.11", "latest_non_vulnerable_version": "8.252_p09", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60254?format=api", "vulnerability_id": "VCID-1yfj-cdt7-1yhf", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.8337", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83351", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83297", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01924", "scoring_system": "epss", "scoring_elements": "0.83361", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97733", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "http://www.securityfocus.com/bid/97733" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252", "reference_id": "1443252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526", "reference_id": "CVE-2017-3526", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119", "reference_id": "RHSA-2017:1119", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3526" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yfj-cdt7-1yhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60252?format=api", "vulnerability_id": "VCID-5y7y-27dr-87g9", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.8986", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.8982", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05127", "scoring_system": "epss", "scoring_elements": "0.89867", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97727", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/" } ], "url": "http://www.securityfocus.com/bid/97727" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455", "reference_id": "1443455", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512", "reference_id": "CVE-2017-3512", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3512" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-27dr-87g9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api", "vulnerability_id": "VCID-6383-1rzy-9kcr", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59436", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906", "reference_id": "1413906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906" }, { "reference_url": "http://www.securityfocus.com/bid/95509", "reference_id": "95509", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securityfocus.com/bid/95509" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3252" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60251?format=api", "vulnerability_id": "VCID-69zc-r9uw-jke5", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81687", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81617", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.8165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81648", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.8168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.817", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97731", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "http://www.securityfocus.com/bid/97731" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007", "reference_id": "1443007", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511", "reference_id": "CVE-2017-3511", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3511" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69zc-r9uw-jke5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=api", "vulnerability_id": "VCID-6xgm-xhae-3bbv", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923", "reference_id": "1413923", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923" }, { "reference_url": "http://www.securityfocus.com/bid/95530", "reference_id": "95530", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securityfocus.com/bid/95530" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-5549" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api", "vulnerability_id": "VCID-7ez7-vdry-wbep", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562", "reference_id": "1413562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562" }, { "reference_url": "http://www.securityfocus.com/bid/95525", "reference_id": "95525", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securityfocus.com/bid/95525" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3289" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api", "vulnerability_id": "VCID-ar8p-z4ww-wuau", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98952", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.9895", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955", "reference_id": "1413955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955" }, { "reference_url": "https://www.exploit-db.com/exploits/41145/", "reference_id": "41145", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://www.exploit-db.com/exploits/41145/" }, { "reference_url": "http://www.securityfocus.com/bid/95488", "reference_id": "95488", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securityfocus.com/bid/95488" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py", "reference_id": "CVE-2017-3241", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/", "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3241" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api", "vulnerability_id": "VCID-c7sa-v6cu-d3ex", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7936", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764", "reference_id": "1413764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764" }, { "reference_url": "http://www.securityfocus.com/bid/95521", "reference_id": "95521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securityfocus.com/bid/95521" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-5547" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60257?format=api", "vulnerability_id": "VCID-c9qw-1g2p-qqcr", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59487", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59506", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.5949", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/2017-07-01", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97745", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "http://www.securityfocus.com/bid/97745" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068", "reference_id": "1443068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544", "reference_id": "CVE-2017-3544", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119", "reference_id": "RHSA-2017:1119", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3544" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9qw-1g2p-qqcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api", "vulnerability_id": "VCID-e2zb-3859-qfe6", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78556", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78594", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911", "reference_id": "1413911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911" }, { "reference_url": "http://www.securityfocus.com/bid/95506", "reference_id": "95506", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securityfocus.com/bid/95506" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-5546" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60256?format=api", "vulnerability_id": "VCID-fsu1-jy1q-qkh1", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.7263", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72655", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72685", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00731", "scoring_system": "epss", "scoring_elements": "0.72691", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97752", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "http://www.securityfocus.com/bid/97752" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097", "reference_id": "1443097", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539", "reference_id": "CVE-2017-3539", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:P/A:N" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119", "reference_id": "RHSA-2017:1119", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3539" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsu1-jy1q-qkh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60255?format=api", "vulnerability_id": "VCID-ft81-49v3-a7cr", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70782", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70721", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70737", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.7073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70798", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97740", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "http://www.securityfocus.com/bid/97740" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083", "reference_id": "1443083", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533", "reference_id": "CVE-2017-3533", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119", "reference_id": "RHSA-2017:1119", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3533" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ft81-49v3-a7cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api", "vulnerability_id": "VCID-ftnn-eurn-wydw", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74991", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74968", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653", "reference_id": "1413653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653" }, { "reference_url": "http://www.securityfocus.com/bid/95566", "reference_id": "95566", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securityfocus.com/bid/95566" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3261" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37027?format=api", "vulnerability_id": "VCID-hvzr-km7c-cqgz", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83207", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01903", "scoring_system": "epss", "scoring_elements": "0.83247", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562", "reference_id": "1414562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562" }, { "reference_url": "http://www.securityfocus.com/bid/95576", "reference_id": "95576", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "http://www.securityfocus.com/bid/95576" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3260" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvzr-km7c-cqgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api", "vulnerability_id": "VCID-k3pa-xdxn-ubbg", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69285", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69227", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717", "reference_id": "1413717", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717" }, { "reference_url": "http://www.securityfocus.com/bid/95563", "reference_id": "95563", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securityfocus.com/bid/95563" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3231" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api", "vulnerability_id": "VCID-qs1s-6yjm-jye5", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71996", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72054", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "http://www.securitytracker.com/id/1037798", "reference_id": "1037798", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037798" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882", "reference_id": "1413882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882" }, { "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html", "reference_id": "2017-02-01.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://source.android.com/security/bulletin/2017-02-01.html" }, { "reference_url": "http://www.securityfocus.com/bid/95512", "reference_id": "95512", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securityfocus.com/bid/95512" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-5552" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60253?format=api", "vulnerability_id": "VCID-rudc-b743-5uh8", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78856", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78902", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78892", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78873", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78912", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97729", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/" } ], "url": "http://www.securityfocus.com/bid/97729" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469", "reference_id": "1443469", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514", "reference_id": "CVE-2017-3514", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3514" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rudc-b743-5uh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api", "vulnerability_id": "VCID-snqh-ebq3-hubn", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920", "reference_id": "1413920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920" }, { "reference_url": "http://www.securityfocus.com/bid/95559", "reference_id": "95559", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securityfocus.com/bid/95559" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-5548" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api", "vulnerability_id": "VCID-tc8v-xrjj-hucq", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554", "reference_id": "1413554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554" }, { "reference_url": "http://www.securityfocus.com/bid/95533", "reference_id": "95533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securityfocus.com/bid/95533" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api", "vulnerability_id": "VCID-v64t-4c46-3bhj", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82894", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8286", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583", "reference_id": "1413583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583" }, { "reference_url": "http://www.securityfocus.com/bid/95498", "reference_id": "95498", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securityfocus.com/bid/95498" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3253" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=api", "vulnerability_id": "VCID-x54g-mhs4-mug4", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97356", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97367", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", "reference_id": "1369383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383" }, { "reference_url": "https://security.archlinux.org/ASA-201609-23", "reference_id": "ASA-201609-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-23" }, { "reference_url": "https://security.archlinux.org/ASA-201609-24", "reference_id": "ASA-201609-24", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-24" }, { "reference_url": "https://security.archlinux.org/AVG-29", "reference_id": "AVG-29", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-29" }, { "reference_url": "https://security.archlinux.org/AVG-30", "reference_id": "AVG-30", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-30" }, { "reference_url": "https://security.gentoo.org/glsa/201612-16", "reference_id": "GLSA-201612-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-16" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1940", "reference_id": "RHSA-2016:1940", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0462", "reference_id": "RHSA-2017:0462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2708", "reference_id": "RHSA-2017:2708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2709", "reference_id": "RHSA-2017:2709", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2709" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2710", "reference_id": "RHSA-2017:2710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3239", "reference_id": "RHSA-2017:3239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3240", "reference_id": "RHSA-2017:3240", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3240" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2123", "reference_id": "RHSA-2018:2123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1245", "reference_id": "RHSA-2019:1245", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1245" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2859", "reference_id": "RHSA-2019:2859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0451", "reference_id": "RHSA-2020:0451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3842", "reference_id": "RHSA-2020:3842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0308", "reference_id": "RHSA-2021:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438", "reference_id": "RHSA-2021:2438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2438" }, { "reference_url": "https://usn.ubuntu.com/3087-1/", "reference_id": "USN-3087-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3087-1/" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" }, { "reference_url": "https://usn.ubuntu.com/3270-1/", "reference_id": "USN-3270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3270-1/" }, { "reference_url": "https://usn.ubuntu.com/3372-1/", "reference_id": "USN-3372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2016-2183" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60250?format=api", "vulnerability_id": "VCID-zzqd-253d-ykca", "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72344", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72348", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3858", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3858" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97737", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "http://www.securityfocus.com/bid/97737" }, { "reference_url": "http://www.securitytracker.com/id/1038286", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "http://www.securitytracker.com/id/1038286" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052", "reference_id": "1443052", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509", "reference_id": "CVE-2017-3509", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" }, { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509" }, { "reference_url": "https://security.gentoo.org/glsa/201705-03", "reference_id": "GLSA-201705-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://security.gentoo.org/glsa/201705-03" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108", "reference_id": "RHSA-2017:1108", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109", "reference_id": "RHSA-2017:1109", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117", "reference_id": "RHSA-2017:1117", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1117" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118", "reference_id": "RHSA-2017:1118", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119", "reference_id": "RHSA-2017:1119", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204", "reference_id": "RHSA-2017:1204", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/3275-1/", "reference_id": "USN-3275-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-1/" }, { "reference_url": "https://usn.ubuntu.com/3275-2/", "reference_id": "USN-3275-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3275-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84834?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@3.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/84835?format=api", "purl": "pkg:ebuild/dev-java/icedtea-bin@7.2.6.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" } ], "aliases": [ "CVE-2017-3509" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zzqd-253d-ykca" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.10" }