Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-8@0?distro=sid
Typedeb
Namespacedebian
Nameopenjdk-8
Version0
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7u95-2.6.4-1
Latest_non_vulnerable_version8u482-ga-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-13cc-fgdq-jygw
vulnerability_id VCID-13cc-fgdq-jygw
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6493
reference_id
reference_type
scores
0
value 0.09698
scoring_system epss
scoring_elements 0.92947
published_at 2026-04-26T12:55:00Z
1
value 0.09698
scoring_system epss
scoring_elements 0.92897
published_at 2026-04-01T12:55:00Z
2
value 0.09698
scoring_system epss
scoring_elements 0.92905
published_at 2026-04-02T12:55:00Z
3
value 0.09698
scoring_system epss
scoring_elements 0.92909
published_at 2026-04-04T12:55:00Z
4
value 0.09698
scoring_system epss
scoring_elements 0.92908
published_at 2026-04-07T12:55:00Z
5
value 0.09698
scoring_system epss
scoring_elements 0.92916
published_at 2026-04-08T12:55:00Z
6
value 0.09698
scoring_system epss
scoring_elements 0.9292
published_at 2026-04-09T12:55:00Z
7
value 0.09698
scoring_system epss
scoring_elements 0.92925
published_at 2026-04-11T12:55:00Z
8
value 0.09698
scoring_system epss
scoring_elements 0.92923
published_at 2026-04-12T12:55:00Z
9
value 0.09698
scoring_system epss
scoring_elements 0.92924
published_at 2026-04-13T12:55:00Z
10
value 0.09698
scoring_system epss
scoring_elements 0.92934
published_at 2026-04-16T12:55:00Z
11
value 0.09698
scoring_system epss
scoring_elements 0.92936
published_at 2026-04-18T12:55:00Z
12
value 0.09698
scoring_system epss
scoring_elements 0.92943
published_at 2026-04-21T12:55:00Z
13
value 0.09698
scoring_system epss
scoring_elements 0.92945
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6493
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
19
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
20
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
21
reference_url http://www.securityfocus.com/bid/70468
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70468
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152760
reference_id 1152760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152760
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6493
reference_id CVE-2014-6493
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6493
28
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
29
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
30
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
31
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
32
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
33
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
34
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
35
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6493
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13cc-fgdq-jygw
1
url VCID-142k-d9mj-1kcj
vulnerability_id VCID-142k-d9mj-1kcj
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3485
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13051
published_at 2026-04-26T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.131
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13076
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13157
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13209
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13178
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13139
published_at 2026-04-12T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13088
published_at 2026-04-13T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-16T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.12991
published_at 2026-04-18T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13089
published_at 2026-04-21T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13083
published_at 2026-04-24T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-02T12:55:00Z
13
value 0.00043
scoring_system epss
scoring_elements 0.13275
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3485
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
13
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
14
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
15
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://www.securityfocus.com/bid/91787
16
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url http://www.securitytracker.com/id/1036365
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1357516
reference_id 1357516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1357516
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3485
reference_id CVE-2016-3485
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3485
28
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url https://security.gentoo.org/glsa/201610-08
29
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/
url https://security.gentoo.org/glsa/201701-43
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3485
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj
2
url VCID-1cfu-xjj6-tfcw
vulnerability_id VCID-1cfu-xjj6-tfcw
summary JDK: unspecified vulnerability fixed in 8u311 (Deployment)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35560
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.70555
published_at 2026-04-01T12:55:00Z
1
value 0.00643
scoring_system epss
scoring_elements 0.70713
published_at 2026-04-26T12:55:00Z
2
value 0.00643
scoring_system epss
scoring_elements 0.70626
published_at 2026-04-09T12:55:00Z
3
value 0.00643
scoring_system epss
scoring_elements 0.70648
published_at 2026-04-11T12:55:00Z
4
value 0.00643
scoring_system epss
scoring_elements 0.70634
published_at 2026-04-12T12:55:00Z
5
value 0.00643
scoring_system epss
scoring_elements 0.7062
published_at 2026-04-13T12:55:00Z
6
value 0.00643
scoring_system epss
scoring_elements 0.70664
published_at 2026-04-16T12:55:00Z
7
value 0.00643
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-18T12:55:00Z
8
value 0.00643
scoring_system epss
scoring_elements 0.70652
published_at 2026-04-21T12:55:00Z
9
value 0.00643
scoring_system epss
scoring_elements 0.70703
published_at 2026-04-24T12:55:00Z
10
value 0.00643
scoring_system epss
scoring_elements 0.70569
published_at 2026-04-02T12:55:00Z
11
value 0.00643
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-04T12:55:00Z
12
value 0.00643
scoring_system epss
scoring_elements 0.70565
published_at 2026-04-07T12:55:00Z
13
value 0.00643
scoring_system epss
scoring_elements 0.7061
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35560
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2027731
reference_id 2027731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2027731
4
reference_url https://security.archlinux.org/AVG-2482
reference_id AVG-2482
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2482
5
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
6
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2021-35560
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cfu-xjj6-tfcw
3
url VCID-1d8b-g1b7-33dn
vulnerability_id VCID-1d8b-g1b7-33dn
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2811
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36957
published_at 2026-04-01T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36709
published_at 2026-04-26T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37032
published_at 2026-04-18T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36972
published_at 2026-04-21T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36741
published_at 2026-04-24T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37129
published_at 2026-04-02T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37161
published_at 2026-04-04T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36992
published_at 2026-04-07T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.37043
published_at 2026-04-08T12:55:00Z
9
value 0.00161
scoring_system epss
scoring_elements 0.37055
published_at 2026-04-09T12:55:00Z
10
value 0.00161
scoring_system epss
scoring_elements 0.37065
published_at 2026-04-11T12:55:00Z
11
value 0.00161
scoring_system epss
scoring_elements 0.37031
published_at 2026-04-12T12:55:00Z
12
value 0.00161
scoring_system epss
scoring_elements 0.37004
published_at 2026-04-13T12:55:00Z
13
value 0.00161
scoring_system epss
scoring_elements 0.37049
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2811
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
4
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180419-0001/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
6
reference_url http://www.securityfocus.com/bid/103810
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103810
7
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040697
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1569203
reference_id 1569203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1569203
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2811
reference_id CVE-2018-2811
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2811
19
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
url https://security.gentoo.org/glsa/201903-14
20
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1202
21
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1204
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2811
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d8b-g1b7-33dn
4
url VCID-1e6n-3kbt-xucw
vulnerability_id VCID-1e6n-3kbt-xucw
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6456
reference_id
reference_type
scores
0
value 0.07124
scoring_system epss
scoring_elements 0.91566
published_at 2026-04-26T12:55:00Z
1
value 0.07124
scoring_system epss
scoring_elements 0.91499
published_at 2026-04-01T12:55:00Z
2
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
3
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
4
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91543
published_at 2026-04-11T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91544
published_at 2026-04-12T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-13T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91565
published_at 2026-04-16T12:55:00Z
11
value 0.07124
scoring_system epss
scoring_elements 0.9156
published_at 2026-04-21T12:55:00Z
12
value 0.07124
scoring_system epss
scoring_elements 0.91568
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6456
10
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
11
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
12
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
13
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
14
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
15
reference_url http://www.securityfocus.com/bid/70522
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70522
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152758
reference_id 1152758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152758
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6456
reference_id CVE-2014-6456
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6456
22
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
23
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
24
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
25
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
26
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6456
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6n-3kbt-xucw
5
url VCID-2v3q-7u91-syh3
vulnerability_id VCID-2v3q-7u91-syh3
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3443
reference_id
reference_type
scores
0
value 0.03399
scoring_system epss
scoring_elements 0.87451
published_at 2026-04-26T12:55:00Z
1
value 0.03399
scoring_system epss
scoring_elements 0.87413
published_at 2026-04-09T12:55:00Z
2
value 0.03399
scoring_system epss
scoring_elements 0.87426
published_at 2026-04-11T12:55:00Z
3
value 0.03399
scoring_system epss
scoring_elements 0.87421
published_at 2026-04-12T12:55:00Z
4
value 0.03399
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-13T12:55:00Z
5
value 0.03399
scoring_system epss
scoring_elements 0.87431
published_at 2026-04-16T12:55:00Z
6
value 0.03399
scoring_system epss
scoring_elements 0.87434
published_at 2026-04-18T12:55:00Z
7
value 0.03399
scoring_system epss
scoring_elements 0.87428
published_at 2026-04-21T12:55:00Z
8
value 0.03399
scoring_system epss
scoring_elements 0.87445
published_at 2026-04-24T12:55:00Z
9
value 0.03399
scoring_system epss
scoring_elements 0.87363
published_at 2026-04-01T12:55:00Z
10
value 0.03399
scoring_system epss
scoring_elements 0.87373
published_at 2026-04-02T12:55:00Z
11
value 0.03399
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-04T12:55:00Z
12
value 0.03399
scoring_system epss
scoring_elements 0.87387
published_at 2026-04-07T12:55:00Z
13
value 0.03399
scoring_system epss
scoring_elements 0.87406
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3443
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
21
reference_url http://www.securityfocus.com/bid/86482
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://www.securityfocus.com/bid/86482
22
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://www.securitytracker.com/id/1035596
23
reference_url http://www.zerodayinitiative.com/advisories/ZDI-16-376
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url http://www.zerodayinitiative.com/advisories/ZDI-16-376
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328618
reference_id 1328618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328618
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3443
reference_id CVE-2016-3443
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3443
32
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url https://security.gentoo.org/glsa/201606-18
33
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
34
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
35
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
36
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
37
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
38
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
39
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
40
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
41
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url https://access.redhat.com/errata/RHSA-2016:1430
42
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3443
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3
6
url VCID-36hf-zrgy-cqda
vulnerability_id VCID-36hf-zrgy-cqda
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
6
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6513
reference_id
reference_type
scores
0
value 0.06096
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-26T12:55:00Z
1
value 0.06096
scoring_system epss
scoring_elements 0.9073
published_at 2026-04-01T12:55:00Z
2
value 0.06096
scoring_system epss
scoring_elements 0.90735
published_at 2026-04-02T12:55:00Z
3
value 0.06096
scoring_system epss
scoring_elements 0.90747
published_at 2026-04-04T12:55:00Z
4
value 0.06096
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-07T12:55:00Z
5
value 0.06096
scoring_system epss
scoring_elements 0.90768
published_at 2026-04-08T12:55:00Z
6
value 0.06096
scoring_system epss
scoring_elements 0.90774
published_at 2026-04-09T12:55:00Z
7
value 0.06096
scoring_system epss
scoring_elements 0.90783
published_at 2026-04-11T12:55:00Z
8
value 0.06096
scoring_system epss
scoring_elements 0.90782
published_at 2026-04-12T12:55:00Z
9
value 0.06096
scoring_system epss
scoring_elements 0.9078
published_at 2026-04-13T12:55:00Z
10
value 0.06096
scoring_system epss
scoring_elements 0.90799
published_at 2026-04-16T12:55:00Z
11
value 0.06096
scoring_system epss
scoring_elements 0.90796
published_at 2026-04-18T12:55:00Z
12
value 0.06096
scoring_system epss
scoring_elements 0.90797
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6513
9
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
10
reference_url http://secunia.com/advisories/61629
reference_id
reference_type
scores
url http://secunia.com/advisories/61629
11
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
12
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
13
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
14
reference_url http://www.securityfocus.com/bid/70569
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70569
15
reference_url http://www.ubuntu.com/usn/USN-2386-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2386-1
16
reference_url http://www.ubuntu.com/usn/USN-2388-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2388-1
17
reference_url http://www.ubuntu.com/usn/USN-2388-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2388-2
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1150118
reference_id 1150118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1150118
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6513
reference_id CVE-2014-6513
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6513
26
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
27
reference_url https://usn.ubuntu.com/2388-2/
reference_id USN-2388-2
reference_type
scores
url https://usn.ubuntu.com/2388-2/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6513
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36hf-zrgy-cqda
7
url VCID-3jv7-ceaz-87cb
vulnerability_id VCID-3jv7-ceaz-87cb
summary JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2940
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50533
published_at 2026-04-26T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50499
published_at 2026-04-07T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50554
published_at 2026-04-13T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50551
published_at 2026-04-09T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50593
published_at 2026-04-11T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50569
published_at 2026-04-12T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50596
published_at 2026-04-16T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50601
published_at 2026-04-18T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50579
published_at 2026-04-21T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50526
published_at 2026-04-24T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50517
published_at 2026-04-02T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.5046
published_at 2026-04-01T12:55:00Z
12
value 0.00271
scoring_system epss
scoring_elements 0.50544
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2940
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
4
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
5
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
7
reference_url http://www.securityfocus.com/bid/104768
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url http://www.securityfocus.com/bid/104768
8
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url http://www.securitytracker.com/id/1041302
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602146
reference_id 1602146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602146
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2940
reference_id CVE-2018-2940
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2940
44
reference_url https://access.redhat.com/errata/RHSA-2018:2253
reference_id RHSA-2018:2253
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2253
45
reference_url https://access.redhat.com/errata/RHSA-2018:2254
reference_id RHSA-2018:2254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2254
46
reference_url https://access.redhat.com/errata/RHSA-2018:2255
reference_id RHSA-2018:2255
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2255
47
reference_url https://access.redhat.com/errata/RHSA-2018:2256
reference_id RHSA-2018:2256
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2256
48
reference_url https://access.redhat.com/errata/RHSA-2018:2568
reference_id RHSA-2018:2568
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2568
49
reference_url https://access.redhat.com/errata/RHSA-2018:2569
reference_id RHSA-2018:2569
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2569
50
reference_url https://access.redhat.com/errata/RHSA-2018:2575
reference_id RHSA-2018:2575
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2575
51
reference_url https://access.redhat.com/errata/RHSA-2018:2576
reference_id RHSA-2018:2576
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2576
52
reference_url https://access.redhat.com/errata/RHSA-2018:2712
reference_id RHSA-2018:2712
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2712
53
reference_url https://access.redhat.com/errata/RHSA-2018:2713
reference_id RHSA-2018:2713
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:2713
54
reference_url https://access.redhat.com/errata/RHSA-2018:3007
reference_id RHSA-2018:3007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:3007
55
reference_url https://access.redhat.com/errata/RHSA-2018:3008
reference_id RHSA-2018:3008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/
url https://access.redhat.com/errata/RHSA-2018:3008
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2940
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3jv7-ceaz-87cb
8
url VCID-45wy-ban5-qqg8
vulnerability_id VCID-45wy-ban5-qqg8
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which can be remotely exploited without
    authentication.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10309
reference_id
reference_type
scores
0
value 0.01803
scoring_system epss
scoring_elements 0.8288
published_at 2026-04-26T12:55:00Z
1
value 0.01803
scoring_system epss
scoring_elements 0.82758
published_at 2026-04-02T12:55:00Z
2
value 0.01803
scoring_system epss
scoring_elements 0.82769
published_at 2026-04-07T12:55:00Z
3
value 0.01803
scoring_system epss
scoring_elements 0.82795
published_at 2026-04-08T12:55:00Z
4
value 0.01803
scoring_system epss
scoring_elements 0.82801
published_at 2026-04-09T12:55:00Z
5
value 0.01803
scoring_system epss
scoring_elements 0.82817
published_at 2026-04-11T12:55:00Z
6
value 0.01803
scoring_system epss
scoring_elements 0.82812
published_at 2026-04-12T12:55:00Z
7
value 0.01803
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-13T12:55:00Z
8
value 0.01803
scoring_system epss
scoring_elements 0.82847
published_at 2026-04-16T12:55:00Z
9
value 0.01803
scoring_system epss
scoring_elements 0.82846
published_at 2026-04-18T12:55:00Z
10
value 0.01803
scoring_system epss
scoring_elements 0.82849
published_at 2026-04-21T12:55:00Z
11
value 0.01803
scoring_system epss
scoring_elements 0.82871
published_at 2026-04-24T12:55:00Z
12
value 0.01803
scoring_system epss
scoring_elements 0.82742
published_at 2026-04-01T12:55:00Z
13
value 0.01803
scoring_system epss
scoring_elements 0.82772
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10309
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
4
reference_url https://www.exploit-db.com/exploits/43103/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://www.exploit-db.com/exploits/43103/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
6
reference_url http://www.securityfocus.com/bid/101328
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url http://www.securityfocus.com/bid/101328
7
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url http://www.securitytracker.com/id/1039596
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503319
reference_id 1503319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503319
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
47
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py
reference_id CVE-2017-10309
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10309
reference_id CVE-2017-10309
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10309
49
reference_url http://srcincite.io/advisories/src-2017-0028/
reference_id CVE-2017-10309
reference_type exploit
scores
url http://srcincite.io/advisories/src-2017-0028/
50
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://security.gentoo.org/glsa/201710-31
51
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:2999
52
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:3264
53
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:3267
54
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:3453
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-10309
risk_score 10.0
exploitability 2.0
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45wy-ban5-qqg8
9
url VCID-4fz7-854p-3qa5
vulnerability_id VCID-4fz7-854p-3qa5
summary OpenJDK: FilePermission checks not preformed correctly on Windows (Libraries, 8213429)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2933
reference_id
reference_type
scores
0
value 0.00507
scoring_system epss
scoring_elements 0.66348
published_at 2026-04-26T12:55:00Z
1
value 0.00507
scoring_system epss
scoring_elements 0.662
published_at 2026-04-01T12:55:00Z
2
value 0.00507
scoring_system epss
scoring_elements 0.6624
published_at 2026-04-02T12:55:00Z
3
value 0.00507
scoring_system epss
scoring_elements 0.66318
published_at 2026-04-11T12:55:00Z
4
value 0.00507
scoring_system epss
scoring_elements 0.66305
published_at 2026-04-12T12:55:00Z
5
value 0.00507
scoring_system epss
scoring_elements 0.66273
published_at 2026-04-13T12:55:00Z
6
value 0.00507
scoring_system epss
scoring_elements 0.66308
published_at 2026-04-16T12:55:00Z
7
value 0.00507
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-18T12:55:00Z
8
value 0.00507
scoring_system epss
scoring_elements 0.6631
published_at 2026-04-21T12:55:00Z
9
value 0.00507
scoring_system epss
scoring_elements 0.66334
published_at 2026-04-24T12:55:00Z
10
value 0.00507
scoring_system epss
scoring_elements 0.66267
published_at 2026-04-04T12:55:00Z
11
value 0.00507
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-07T12:55:00Z
12
value 0.00507
scoring_system epss
scoring_elements 0.66284
published_at 2026-04-08T12:55:00Z
13
value 0.00507
scoring_system epss
scoring_elements 0.66298
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2933
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
7
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
8
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
9
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777981
reference_id 1777981
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777981
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2933
reference_id CVE-2019-2933
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2933
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2933
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fz7-854p-3qa5
10
url VCID-5y7y-27dr-87g9
vulnerability_id VCID-5y7y-27dr-87g9
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3512
reference_id
reference_type
scores
0
value 0.05127
scoring_system epss
scoring_elements 0.89817
published_at 2026-04-01T12:55:00Z
1
value 0.05127
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-26T12:55:00Z
2
value 0.05127
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-07T12:55:00Z
3
value 0.05127
scoring_system epss
scoring_elements 0.89856
published_at 2026-04-08T12:55:00Z
4
value 0.05127
scoring_system epss
scoring_elements 0.89862
published_at 2026-04-09T12:55:00Z
5
value 0.05127
scoring_system epss
scoring_elements 0.89868
published_at 2026-04-11T12:55:00Z
6
value 0.05127
scoring_system epss
scoring_elements 0.89867
published_at 2026-04-21T12:55:00Z
7
value 0.05127
scoring_system epss
scoring_elements 0.8986
published_at 2026-04-13T12:55:00Z
8
value 0.05127
scoring_system epss
scoring_elements 0.89873
published_at 2026-04-16T12:55:00Z
9
value 0.05127
scoring_system epss
scoring_elements 0.89874
published_at 2026-04-18T12:55:00Z
10
value 0.05127
scoring_system epss
scoring_elements 0.8982
published_at 2026-04-02T12:55:00Z
11
value 0.05127
scoring_system epss
scoring_elements 0.89834
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3512
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97727
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/
url http://www.securityfocus.com/bid/97727
5
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/
url http://www.securitytracker.com/id/1038286
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443455
reference_id 1443455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443455
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3512
reference_id CVE-2017-3512
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3512
13
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/
url https://security.gentoo.org/glsa/201705-03
14
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/
url https://security.gentoo.org/glsa/201707-01
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-3512
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-27dr-87g9
11
url VCID-6fce-bys3-kkgm
vulnerability_id VCID-6fce-bys3-kkgm
summary openjdk: OpenJDK: Update LibPNG (Oracle CPU 2026-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460045
reference_id 2460045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460045
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2026-22020
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fce-bys3-kkgm
12
url VCID-6gh4-5buw-1ydb
vulnerability_id VCID-6gh4-5buw-1ydb
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6466
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-26T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30291
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.3032
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30368
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30184
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30244
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30278
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30282
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30239
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30192
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30206
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30187
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30144
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.30073
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6466
8
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
9
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
10
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
11
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
12
reference_url http://www.securityfocus.com/bid/70484
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70484
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152762
reference_id 1152762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152762
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6466
reference_id CVE-2014-6466
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6466
20
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6466
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gh4-5buw-1ydb
13
url VCID-6mq4-munv-sffc
vulnerability_id VCID-6mq4-munv-sffc
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2697
reference_id
reference_type
scores
0
value 0.0408
scoring_system epss
scoring_elements 0.88588
published_at 2026-04-26T12:55:00Z
1
value 0.0408
scoring_system epss
scoring_elements 0.88502
published_at 2026-04-01T12:55:00Z
2
value 0.0408
scoring_system epss
scoring_elements 0.8851
published_at 2026-04-02T12:55:00Z
3
value 0.0408
scoring_system epss
scoring_elements 0.88558
published_at 2026-04-13T12:55:00Z
4
value 0.0408
scoring_system epss
scoring_elements 0.88572
published_at 2026-04-16T12:55:00Z
5
value 0.0408
scoring_system epss
scoring_elements 0.88568
published_at 2026-04-18T12:55:00Z
6
value 0.0408
scoring_system epss
scoring_elements 0.88565
published_at 2026-04-21T12:55:00Z
7
value 0.0408
scoring_system epss
scoring_elements 0.88582
published_at 2026-04-24T12:55:00Z
8
value 0.0408
scoring_system epss
scoring_elements 0.88527
published_at 2026-04-04T12:55:00Z
9
value 0.0408
scoring_system epss
scoring_elements 0.88531
published_at 2026-04-07T12:55:00Z
10
value 0.0408
scoring_system epss
scoring_elements 0.88549
published_at 2026-04-08T12:55:00Z
11
value 0.0408
scoring_system epss
scoring_elements 0.88554
published_at 2026-04-09T12:55:00Z
12
value 0.0408
scoring_system epss
scoring_elements 0.88566
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2697
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1704480
reference_id 1704480
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1704480
4
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1777
reference_id CVE-2019-2697
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1777
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt
reference_id CVE-2019-2697
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt
6
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
7
reference_url https://security.gentoo.org/glsa/201908-10
reference_id GLSA-201908-10
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://security.gentoo.org/glsa/201908-10
8
reference_url https://access.redhat.com/errata/RHSA-2019:1163
reference_id RHSA-2019:1163
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1163
9
reference_url https://access.redhat.com/errata/RHSA-2019:1164
reference_id RHSA-2019:1164
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1164
10
reference_url https://access.redhat.com/errata/RHSA-2019:1165
reference_id RHSA-2019:1165
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1165
11
reference_url https://access.redhat.com/errata/RHSA-2019:1166
reference_id RHSA-2019:1166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1166
12
reference_url https://access.redhat.com/errata/RHSA-2019:1238
reference_id RHSA-2019:1238
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1238
13
reference_url https://access.redhat.com/errata/RHSA-2019:1325
reference_id RHSA-2019:1325
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://access.redhat.com/errata/RHSA-2019:1325
14
reference_url https://usn.ubuntu.com/3975-1/
reference_id USN-3975-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/
url https://usn.ubuntu.com/3975-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2697
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mq4-munv-sffc
14
url VCID-6q6b-qa23-dyge
vulnerability_id VCID-6q6b-qa23-dyge
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0413
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27035
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27075
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27111
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.269
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26968
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27017
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26973
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26916
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26926
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26901
published_at 2026-04-18T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26865
published_at 2026-04-21T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26816
published_at 2026-04-24T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26808
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0413
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1184278
reference_id 1184278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1184278
3
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
4
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
5
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
6
reference_url https://usn.ubuntu.com/2487-1/
reference_id USN-2487-1
reference_type
scores
url https://usn.ubuntu.com/2487-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0413
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6q6b-qa23-dyge
15
url VCID-73ad-ngrz-6uee
vulnerability_id VCID-73ad-ngrz-6uee
summary JDK: unspecified vulnerability fixed in 8u201 (Deployment)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2449
reference_id
reference_type
scores
0
value 0.02418
scoring_system epss
scoring_elements 0.85172
published_at 2026-04-26T12:55:00Z
1
value 0.02418
scoring_system epss
scoring_elements 0.85118
published_at 2026-04-13T12:55:00Z
2
value 0.02418
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-16T12:55:00Z
3
value 0.02418
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-18T12:55:00Z
4
value 0.02418
scoring_system epss
scoring_elements 0.85139
published_at 2026-04-21T12:55:00Z
5
value 0.02418
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-24T12:55:00Z
6
value 0.02418
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-02T12:55:00Z
7
value 0.02418
scoring_system epss
scoring_elements 0.85045
published_at 2026-04-01T12:55:00Z
8
value 0.02418
scoring_system epss
scoring_elements 0.85076
published_at 2026-04-04T12:55:00Z
9
value 0.02418
scoring_system epss
scoring_elements 0.8508
published_at 2026-04-07T12:55:00Z
10
value 0.02418
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-08T12:55:00Z
11
value 0.02418
scoring_system epss
scoring_elements 0.85108
published_at 2026-04-09T12:55:00Z
12
value 0.02418
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-11T12:55:00Z
13
value 0.02418
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2449
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20190118-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url https://security.netapp.com/advisory/ntap-20190118-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
5
reference_url http://www.securityfocus.com/bid/106597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url http://www.securityfocus.com/bid/106597
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1685601
reference_id 1685601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1685601
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2449
reference_id CVE-2019-2449
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2449
25
reference_url https://access.redhat.com/errata/RHSA-2019:0469
reference_id RHSA-2019:0469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url https://access.redhat.com/errata/RHSA-2019:0469
26
reference_url https://access.redhat.com/errata/RHSA-2019:0472
reference_id RHSA-2019:0472
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url https://access.redhat.com/errata/RHSA-2019:0472
27
reference_url https://access.redhat.com/errata/RHSA-2019:0640
reference_id RHSA-2019:0640
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url https://access.redhat.com/errata/RHSA-2019:0640
28
reference_url https://access.redhat.com/errata/RHSA-2019:1238
reference_id RHSA-2019:1238
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/
url https://access.redhat.com/errata/RHSA-2019:1238
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2449
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73ad-ngrz-6uee
16
url VCID-7jyy-8x35-wbba
vulnerability_id VCID-7jyy-8x35-wbba
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.4612
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.4616
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46173
published_at 2026-04-26T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.4618
published_at 2026-04-04T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46128
published_at 2026-04-07T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46185
published_at 2026-04-08T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46183
published_at 2026-04-09T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46206
published_at 2026-04-11T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46178
published_at 2026-04-12T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46187
published_at 2026-04-13T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46243
published_at 2026-04-16T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.4624
published_at 2026-04-18T12:55:00Z
12
value 0.00233
scoring_system epss
scoring_elements 0.46184
published_at 2026-04-21T12:55:00Z
13
value 0.00233
scoring_system epss
scoring_elements 0.46165
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
reference_id 1994980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
4
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.gentoo.org/glsa/202209-05
5
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
6
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2021-2432
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba
17
url VCID-7zbp-hqrr-zfh8
vulnerability_id VCID-7zbp-hqrr-zfh8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0484
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.79295
published_at 2026-04-01T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79302
published_at 2026-04-02T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.79325
published_at 2026-04-04T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79311
published_at 2026-04-07T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.79337
published_at 2026-04-08T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79346
published_at 2026-04-09T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.7937
published_at 2026-04-11T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79355
published_at 2026-04-12T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79344
published_at 2026-04-13T12:55:00Z
9
value 0.01252
scoring_system epss
scoring_elements 0.79372
published_at 2026-04-16T12:55:00Z
10
value 0.01252
scoring_system epss
scoring_elements 0.79366
published_at 2026-04-18T12:55:00Z
11
value 0.01252
scoring_system epss
scoring_elements 0.79368
published_at 2026-04-21T12:55:00Z
12
value 0.01252
scoring_system epss
scoring_elements 0.79401
published_at 2026-04-24T12:55:00Z
13
value 0.01252
scoring_system epss
scoring_elements 0.79406
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0484
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211773
reference_id 1211773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211773
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
5
reference_url https://access.redhat.com/errata/RHSA-2015:0857
reference_id RHSA-2015:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0857
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zbp-hqrr-zfh8
18
url VCID-8ad6-fezd-efdn
vulnerability_id VCID-8ad6-fezd-efdn
summary Vulnerability in Oracle Java SE (component: Install). The supported version that is affected is Oracle Java SE: 8u451. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE executes to compromise Oracle Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Java SE. Note: Applies to installation process on client deployment of Java. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50063
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-07T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17206
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17184
published_at 2026-04-09T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17127
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17256
published_at 2026-04-04T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18761
published_at 2026-04-26T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1888
published_at 2026-04-18T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18892
published_at 2026-04-21T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18782
published_at 2026-04-24T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19013
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18914
published_at 2026-04-13T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18868
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50063
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:16Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2025-50063
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ad6-fezd-efdn
19
url VCID-8b8r-rdb7-7bed
vulnerability_id VCID-8b8r-rdb7-7bed
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2627
reference_id
reference_type
scores
0
value 0.01759
scoring_system epss
scoring_elements 0.82533
published_at 2026-04-01T12:55:00Z
1
value 0.01759
scoring_system epss
scoring_elements 0.82547
published_at 2026-04-02T12:55:00Z
2
value 0.01759
scoring_system epss
scoring_elements 0.82562
published_at 2026-04-04T12:55:00Z
3
value 0.01759
scoring_system epss
scoring_elements 0.82559
published_at 2026-04-07T12:55:00Z
4
value 0.01759
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-08T12:55:00Z
5
value 0.01759
scoring_system epss
scoring_elements 0.82593
published_at 2026-04-09T12:55:00Z
6
value 0.01759
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-11T12:55:00Z
7
value 0.01759
scoring_system epss
scoring_elements 0.82605
published_at 2026-04-12T12:55:00Z
8
value 0.01759
scoring_system epss
scoring_elements 0.82598
published_at 2026-04-13T12:55:00Z
9
value 0.01759
scoring_system epss
scoring_elements 0.82635
published_at 2026-04-18T12:55:00Z
10
value 0.01759
scoring_system epss
scoring_elements 0.82639
published_at 2026-04-21T12:55:00Z
11
value 0.01759
scoring_system epss
scoring_elements 0.8266
published_at 2026-04-24T12:55:00Z
12
value 0.01759
scoring_system epss
scoring_elements 0.8267
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2627
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243291
reference_id 1243291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243291
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2627
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8b8r-rdb7-7bed
20
url VCID-8gea-2k69-cbdk
vulnerability_id VCID-8gea-2k69-cbdk
summary JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2973
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37071
published_at 2026-04-04T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36936
published_at 2026-04-12T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.37038
published_at 2026-04-02T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36971
published_at 2026-04-11T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36962
published_at 2026-04-09T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.3695
published_at 2026-04-08T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36868
published_at 2026-04-01T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-07T12:55:00Z
8
value 0.00251
scoring_system epss
scoring_elements 0.48425
published_at 2026-04-26T12:55:00Z
9
value 0.00251
scoring_system epss
scoring_elements 0.48427
published_at 2026-04-21T12:55:00Z
10
value 0.00251
scoring_system epss
scoring_elements 0.48477
published_at 2026-04-16T12:55:00Z
11
value 0.00251
scoring_system epss
scoring_elements 0.48472
published_at 2026-04-18T12:55:00Z
12
value 0.00251
scoring_system epss
scoring_elements 0.48413
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2973
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
4
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
5
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
7
reference_url http://www.securityfocus.com/bid/104773
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url http://www.securityfocus.com/bid/104773
8
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url http://www.securitytracker.com/id/1041302
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602145
reference_id 1602145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602145
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2973
reference_id CVE-2018-2973
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2973
45
reference_url https://access.redhat.com/errata/RHSA-2018:2253
reference_id RHSA-2018:2253
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2253
46
reference_url https://access.redhat.com/errata/RHSA-2018:2254
reference_id RHSA-2018:2254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2254
47
reference_url https://access.redhat.com/errata/RHSA-2018:2255
reference_id RHSA-2018:2255
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2255
48
reference_url https://access.redhat.com/errata/RHSA-2018:2256
reference_id RHSA-2018:2256
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2256
49
reference_url https://access.redhat.com/errata/RHSA-2018:2568
reference_id RHSA-2018:2568
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2568
50
reference_url https://access.redhat.com/errata/RHSA-2018:2569
reference_id RHSA-2018:2569
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2569
51
reference_url https://access.redhat.com/errata/RHSA-2018:2575
reference_id RHSA-2018:2575
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2575
52
reference_url https://access.redhat.com/errata/RHSA-2018:2576
reference_id RHSA-2018:2576
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2576
53
reference_url https://access.redhat.com/errata/RHSA-2018:2712
reference_id RHSA-2018:2712
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2712
54
reference_url https://access.redhat.com/errata/RHSA-2018:2713
reference_id RHSA-2018:2713
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:2713
55
reference_url https://access.redhat.com/errata/RHSA-2018:3007
reference_id RHSA-2018:3007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:3007
56
reference_url https://access.redhat.com/errata/RHSA-2018:3008
reference_id RHSA-2018:3008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/
url https://access.redhat.com/errata/RHSA-2018:3008
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2973
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8gea-2k69-cbdk
21
url VCID-8x6f-shrr-sqaj
vulnerability_id VCID-8x6f-shrr-sqaj
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2639
reference_id
reference_type
scores
0
value 0.00596
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-26T12:55:00Z
1
value 0.00596
scoring_system epss
scoring_elements 0.69273
published_at 2026-04-01T12:55:00Z
2
value 0.00596
scoring_system epss
scoring_elements 0.69285
published_at 2026-04-02T12:55:00Z
3
value 0.00596
scoring_system epss
scoring_elements 0.69327
published_at 2026-04-13T12:55:00Z
4
value 0.00596
scoring_system epss
scoring_elements 0.69366
published_at 2026-04-16T12:55:00Z
5
value 0.00596
scoring_system epss
scoring_elements 0.69376
published_at 2026-04-18T12:55:00Z
6
value 0.00596
scoring_system epss
scoring_elements 0.69356
published_at 2026-04-21T12:55:00Z
7
value 0.00596
scoring_system epss
scoring_elements 0.69407
published_at 2026-04-24T12:55:00Z
8
value 0.00596
scoring_system epss
scoring_elements 0.69303
published_at 2026-04-04T12:55:00Z
9
value 0.00596
scoring_system epss
scoring_elements 0.69283
published_at 2026-04-07T12:55:00Z
10
value 0.00596
scoring_system epss
scoring_elements 0.69332
published_at 2026-04-08T12:55:00Z
11
value 0.00596
scoring_system epss
scoring_elements 0.69349
published_at 2026-04-09T12:55:00Z
12
value 0.00596
scoring_system epss
scoring_elements 0.69372
published_at 2026-04-11T12:55:00Z
13
value 0.00596
scoring_system epss
scoring_elements 0.69355
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2639
2
reference_url http://www.securityfocus.com/bid/102556
reference_id 102556
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url http://www.securityfocus.com/bid/102556
3
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url http://www.securitytracker.com/id/1040203
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535351
reference_id 1535351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535351
5
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
6
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url https://access.redhat.com/errata/RHSA-2018:0099
8
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url https://access.redhat.com/errata/RHSA-2018:0351
9
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url https://access.redhat.com/errata/RHSA-2018:0352
10
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/
url https://access.redhat.com/errata/RHSA-2018:1463
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2639
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x6f-shrr-sqaj
22
url VCID-9bfs-vsq6-zbd9
vulnerability_id VCID-9bfs-vsq6-zbd9
summary OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3149
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20796
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20942
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.21
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20717
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20794
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20871
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20828
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20776
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20766
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20758
published_at 2026-04-18T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20745
published_at 2026-04-21T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20629
published_at 2026-04-24T12:55:00Z
13
value 0.00067
scoring_system epss
scoring_elements 0.20624
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3149
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213365
reference_id 1213365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213365
3
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-3149
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9bfs-vsq6-zbd9
23
url VCID-9gpf-rkqa-2fb4
vulnerability_id VCID-9gpf-rkqa-2fb4
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
17
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json
18
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4902
reference_id
reference_type
scores
0
value 0.07681
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-01T12:55:00Z
1
value 0.07681
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-02T12:55:00Z
2
value 0.07681
scoring_system epss
scoring_elements 0.91882
published_at 2026-04-04T12:55:00Z
3
value 0.07681
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-07T12:55:00Z
4
value 0.07681
scoring_system epss
scoring_elements 0.91901
published_at 2026-04-08T12:55:00Z
5
value 0.07681
scoring_system epss
scoring_elements 0.91907
published_at 2026-04-09T12:55:00Z
6
value 0.07681
scoring_system epss
scoring_elements 0.9191
published_at 2026-04-12T12:55:00Z
7
value 0.07681
scoring_system epss
scoring_elements 0.91906
published_at 2026-04-13T12:55:00Z
8
value 0.07681
scoring_system epss
scoring_elements 0.91925
published_at 2026-04-16T12:55:00Z
9
value 0.07681
scoring_system epss
scoring_elements 0.91922
published_at 2026-04-18T12:55:00Z
10
value 0.07681
scoring_system epss
scoring_elements 0.91919
published_at 2026-04-21T12:55:00Z
11
value 0.18088
scoring_system epss
scoring_elements 0.95193
published_at 2026-04-26T12:55:00Z
12
value 0.18088
scoring_system epss
scoring_elements 0.95191
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4902
19
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902
20
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
21
reference_url http://www.securityfocus.com/bid/77241
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://www.securityfocus.com/bid/77241
22
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url http://www.securitytracker.com/id/1033884
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273860
reference_id 1273860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273860
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4902
reference_id CVE-2015-4902
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4902
89
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url https://security.gentoo.org/glsa/201603-11
90
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
91
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
92
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
93
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
94
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
95
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
96
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
97
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
98
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/
url https://access.redhat.com/errata/RHSA-2016:1430
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-4902
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpf-rkqa-2fb4
24
url VCID-9j7e-jeqm-bkat
vulnerability_id VCID-9j7e-jeqm-bkat
summary JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2783
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59267
published_at 2026-04-16T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59255
published_at 2026-04-26T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59235
published_at 2026-04-24T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59254
published_at 2026-04-21T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59273
published_at 2026-04-18T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59231
published_at 2026-04-13T12:55:00Z
6
value 0.00492
scoring_system epss
scoring_elements 0.65667
published_at 2026-04-09T12:55:00Z
7
value 0.00492
scoring_system epss
scoring_elements 0.65687
published_at 2026-04-11T12:55:00Z
8
value 0.00492
scoring_system epss
scoring_elements 0.65673
published_at 2026-04-12T12:55:00Z
9
value 0.00492
scoring_system epss
scoring_elements 0.65637
published_at 2026-04-04T12:55:00Z
10
value 0.00492
scoring_system epss
scoring_elements 0.65603
published_at 2026-04-07T12:55:00Z
11
value 0.00492
scoring_system epss
scoring_elements 0.65655
published_at 2026-04-08T12:55:00Z
12
value 0.00492
scoring_system epss
scoring_elements 0.65608
published_at 2026-04-02T12:55:00Z
13
value 0.00492
scoring_system epss
scoring_elements 0.65559
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2783
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
4
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
5
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
6
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
8
reference_url http://www.securityfocus.com/bid/103832
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url http://www.securityfocus.com/bid/103832
9
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url http://www.securitytracker.com/id/1040697
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1569204
reference_id 1569204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1569204
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2783
reference_id CVE-2018-2783
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2783
31
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0099
32
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0100
33
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1203
34
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1205
35
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1721
36
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1722
37
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1723
38
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1724
39
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1974
40
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://access.redhat.com/errata/RHSA-2018:1975
41
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/
url https://usn.ubuntu.com/3644-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2783
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j7e-jeqm-bkat
25
url VCID-9p9b-qh1v-gkcp
vulnerability_id VCID-9p9b-qh1v-gkcp
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5568
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75993
published_at 2026-04-26T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75914
published_at 2026-04-08T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-12T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75921
published_at 2026-04-13T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75959
published_at 2026-04-16T12:55:00Z
7
value 0.00917
scoring_system epss
scoring_elements 0.75961
published_at 2026-04-18T12:55:00Z
8
value 0.00917
scoring_system epss
scoring_elements 0.75945
published_at 2026-04-21T12:55:00Z
9
value 0.00917
scoring_system epss
scoring_elements 0.75983
published_at 2026-04-24T12:55:00Z
10
value 0.00917
scoring_system epss
scoring_elements 0.75869
published_at 2026-04-02T12:55:00Z
11
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
12
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5568
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/
url http://www.securitytracker.com/id/1037040
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386112
reference_id 1386112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386112
5
reference_url http://www.securityfocus.com/bid/93621
reference_id 93621
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/
url http://www.securityfocus.com/bid/93621
6
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/
url https://security.gentoo.org/glsa/201611-04
7
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/
url https://security.gentoo.org/glsa/201701-43
8
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-5568
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p9b-qh1v-gkcp
26
url VCID-9yus-96z5-dub9
vulnerability_id VCID-9yus-96z5-dub9
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6532
reference_id
reference_type
scores
0
value 0.06948
scoring_system epss
scoring_elements 0.91459
published_at 2026-04-26T12:55:00Z
1
value 0.06948
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-01T12:55:00Z
2
value 0.06948
scoring_system epss
scoring_elements 0.91387
published_at 2026-04-02T12:55:00Z
3
value 0.06948
scoring_system epss
scoring_elements 0.91398
published_at 2026-04-04T12:55:00Z
4
value 0.06948
scoring_system epss
scoring_elements 0.91405
published_at 2026-04-07T12:55:00Z
5
value 0.06948
scoring_system epss
scoring_elements 0.91417
published_at 2026-04-08T12:55:00Z
6
value 0.06948
scoring_system epss
scoring_elements 0.91424
published_at 2026-04-09T12:55:00Z
7
value 0.06948
scoring_system epss
scoring_elements 0.9143
published_at 2026-04-11T12:55:00Z
8
value 0.06948
scoring_system epss
scoring_elements 0.91433
published_at 2026-04-12T12:55:00Z
9
value 0.06948
scoring_system epss
scoring_elements 0.91432
published_at 2026-04-13T12:55:00Z
10
value 0.06948
scoring_system epss
scoring_elements 0.91455
published_at 2026-04-16T12:55:00Z
11
value 0.06948
scoring_system epss
scoring_elements 0.91451
published_at 2026-04-18T12:55:00Z
12
value 0.06948
scoring_system epss
scoring_elements 0.91452
published_at 2026-04-21T12:55:00Z
13
value 0.06948
scoring_system epss
scoring_elements 0.91462
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6532
14
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
15
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
16
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
17
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
18
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
19
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
20
reference_url http://www.securityfocus.com/bid/70507
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70507
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152756
reference_id 1152756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152756
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6532
reference_id CVE-2014-6532
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6532
28
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
29
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
30
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
31
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
32
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
33
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
34
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
35
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6532
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yus-96z5-dub9
27
url VCID-arwd-bvw4-gya1
vulnerability_id VCID-arwd-bvw4-gya1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21271
reference_id
reference_type
scores
0
value 0.00589
scoring_system epss
scoring_elements 0.69235
published_at 2026-04-26T12:55:00Z
1
value 0.00589
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-08T12:55:00Z
2
value 0.00589
scoring_system epss
scoring_elements 0.69171
published_at 2026-04-09T12:55:00Z
3
value 0.00589
scoring_system epss
scoring_elements 0.69192
published_at 2026-04-11T12:55:00Z
4
value 0.00589
scoring_system epss
scoring_elements 0.69177
published_at 2026-04-12T12:55:00Z
5
value 0.00589
scoring_system epss
scoring_elements 0.69148
published_at 2026-04-13T12:55:00Z
6
value 0.00589
scoring_system epss
scoring_elements 0.69188
published_at 2026-04-16T12:55:00Z
7
value 0.00589
scoring_system epss
scoring_elements 0.69196
published_at 2026-04-18T12:55:00Z
8
value 0.00589
scoring_system epss
scoring_elements 0.69176
published_at 2026-04-21T12:55:00Z
9
value 0.00589
scoring_system epss
scoring_elements 0.69226
published_at 2026-04-24T12:55:00Z
10
value 0.00589
scoring_system epss
scoring_elements 0.69098
published_at 2026-04-02T12:55:00Z
11
value 0.00589
scoring_system epss
scoring_elements 0.6912
published_at 2026-04-04T12:55:00Z
12
value 0.00589
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21271
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/
url https://security.gentoo.org/glsa/202209-05
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2022-21271
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-arwd-bvw4-gya1
28
url VCID-azcs-6ud7-nfab
vulnerability_id VCID-azcs-6ud7-nfab
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0492
reference_id
reference_type
scores
0
value 0.02032
scoring_system epss
scoring_elements 0.83735
published_at 2026-04-01T12:55:00Z
1
value 0.02032
scoring_system epss
scoring_elements 0.83748
published_at 2026-04-02T12:55:00Z
2
value 0.02032
scoring_system epss
scoring_elements 0.83763
published_at 2026-04-04T12:55:00Z
3
value 0.02032
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-07T12:55:00Z
4
value 0.02032
scoring_system epss
scoring_elements 0.83789
published_at 2026-04-08T12:55:00Z
5
value 0.02032
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-09T12:55:00Z
6
value 0.02032
scoring_system epss
scoring_elements 0.83811
published_at 2026-04-11T12:55:00Z
7
value 0.02032
scoring_system epss
scoring_elements 0.83805
published_at 2026-04-12T12:55:00Z
8
value 0.02032
scoring_system epss
scoring_elements 0.83801
published_at 2026-04-13T12:55:00Z
9
value 0.02032
scoring_system epss
scoring_elements 0.83834
published_at 2026-04-16T12:55:00Z
10
value 0.02032
scoring_system epss
scoring_elements 0.83835
published_at 2026-04-21T12:55:00Z
11
value 0.02032
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-24T12:55:00Z
12
value 0.02032
scoring_system epss
scoring_elements 0.83869
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0492
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211770
reference_id 1211770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211770
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
5
reference_url https://access.redhat.com/errata/RHSA-2015:0857
reference_id RHSA-2015:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0857
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0492
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azcs-6ud7-nfab
29
url VCID-b4ha-df1e-kkah
vulnerability_id VCID-b4ha-df1e-kkah
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4736
reference_id
reference_type
scores
0
value 0.05553
scoring_system epss
scoring_elements 0.90231
published_at 2026-04-01T12:55:00Z
1
value 0.05553
scoring_system epss
scoring_elements 0.90234
published_at 2026-04-02T12:55:00Z
2
value 0.05553
scoring_system epss
scoring_elements 0.90247
published_at 2026-04-04T12:55:00Z
3
value 0.05553
scoring_system epss
scoring_elements 0.90251
published_at 2026-04-07T12:55:00Z
4
value 0.05553
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-08T12:55:00Z
5
value 0.05553
scoring_system epss
scoring_elements 0.90274
published_at 2026-04-09T12:55:00Z
6
value 0.05553
scoring_system epss
scoring_elements 0.90282
published_at 2026-04-11T12:55:00Z
7
value 0.05553
scoring_system epss
scoring_elements 0.90281
published_at 2026-04-12T12:55:00Z
8
value 0.05553
scoring_system epss
scoring_elements 0.90276
published_at 2026-04-13T12:55:00Z
9
value 0.05553
scoring_system epss
scoring_elements 0.90292
published_at 2026-04-18T12:55:00Z
10
value 0.05553
scoring_system epss
scoring_elements 0.90288
published_at 2026-04-21T12:55:00Z
11
value 0.05553
scoring_system epss
scoring_elements 0.90303
published_at 2026-04-24T12:55:00Z
12
value 0.05553
scoring_system epss
scoring_elements 0.90302
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4736
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243284
reference_id 1243284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243284
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
7
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-4736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ha-df1e-kkah
30
url VCID-b9dc-j8uy-nfdz
vulnerability_id VCID-b9dc-j8uy-nfdz
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which can be remotely exploited without
    authentication.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10293
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62692
published_at 2026-04-26T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62527
published_at 2026-04-01T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62585
published_at 2026-04-02T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62582
published_at 2026-04-07T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62632
published_at 2026-04-13T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62648
published_at 2026-04-09T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62666
published_at 2026-04-11T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62655
published_at 2026-04-12T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62673
published_at 2026-04-16T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62682
published_at 2026-04-18T12:55:00Z
10
value 0.00432
scoring_system epss
scoring_elements 0.62664
published_at 2026-04-21T12:55:00Z
11
value 0.00432
scoring_system epss
scoring_elements 0.62676
published_at 2026-04-24T12:55:00Z
12
value 0.00432
scoring_system epss
scoring_elements 0.62617
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10293
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
5
reference_url http://www.securityfocus.com/bid/101338
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url http://www.securityfocus.com/bid/101338
6
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url http://www.securitytracker.com/id/1039596
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503320
reference_id 1503320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503320
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10293
reference_id CVE-2017-10293
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10293
43
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url https://security.gentoo.org/glsa/201710-31
44
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url https://access.redhat.com/errata/RHSA-2017:2999
45
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url https://access.redhat.com/errata/RHSA-2017:3046
46
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/
url https://access.redhat.com/errata/RHSA-2017:3047
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-10293
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9dc-j8uy-nfdz
31
url VCID-bmb1-ekh1-9fc3
vulnerability_id VCID-bmb1-ekh1-9fc3
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6458
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36344
published_at 2026-04-26T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36591
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36747
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36779
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36615
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36666
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36683
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36692
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36657
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36631
published_at 2026-04-13T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36676
published_at 2026-04-16T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36659
published_at 2026-04-18T12:55:00Z
12
value 0.00158
scoring_system epss
scoring_elements 0.36599
published_at 2026-04-21T12:55:00Z
13
value 0.00158
scoring_system epss
scoring_elements 0.36375
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6458
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://secunia.com/advisories/61635
reference_id
reference_type
scores
url http://secunia.com/advisories/61635
19
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
20
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
21
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
22
reference_url http://www.securityfocus.com/bid/70460
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70460
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152763
reference_id 1152763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152763
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6458
reference_id CVE-2014-6458
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6458
29
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
30
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
31
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
32
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
33
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
34
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
35
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
36
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6458
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmb1-ekh1-9fc3
32
url VCID-bqav-d2f9-x7d1
vulnerability_id VCID-bqav-d2f9-x7d1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
reference_id
reference_type
scores
0
value 0.01404
scoring_system epss
scoring_elements 0.80398
published_at 2026-04-01T12:55:00Z
1
value 0.01404
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-26T12:55:00Z
2
value 0.01404
scoring_system epss
scoring_elements 0.8051
published_at 2026-04-24T12:55:00Z
3
value 0.01404
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-21T12:55:00Z
4
value 0.01404
scoring_system epss
scoring_elements 0.80404
published_at 2026-04-02T12:55:00Z
5
value 0.01404
scoring_system epss
scoring_elements 0.80481
published_at 2026-04-18T12:55:00Z
6
value 0.01404
scoring_system epss
scoring_elements 0.8048
published_at 2026-04-16T12:55:00Z
7
value 0.01404
scoring_system epss
scoring_elements 0.80452
published_at 2026-04-13T12:55:00Z
8
value 0.01404
scoring_system epss
scoring_elements 0.80458
published_at 2026-04-12T12:55:00Z
9
value 0.01404
scoring_system epss
scoring_elements 0.80473
published_at 2026-04-11T12:55:00Z
10
value 0.01404
scoring_system epss
scoring_elements 0.80454
published_at 2026-04-09T12:55:00Z
11
value 0.01404
scoring_system epss
scoring_elements 0.80444
published_at 2026-04-08T12:55:00Z
12
value 0.01404
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-04T12:55:00Z
13
value 0.01404
scoring_system epss
scoring_elements 0.80414
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
reference_id 1951231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
5
reference_url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_id april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
6
reference_url https://security.archlinux.org/AVG-1865
reference_id AVG-1865
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1865
7
reference_url https://security.archlinux.org/AVG-1866
reference_id AVG-1866
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1866
8
reference_url https://security.archlinux.org/AVG-1867
reference_id AVG-1867
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1867
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
18
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2021-2161
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1
33
url VCID-c1mn-fexd-p3dk
vulnerability_id VCID-c1mn-fexd-p3dk
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2638
reference_id
reference_type
scores
0
value 0.00748
scoring_system epss
scoring_elements 0.73188
published_at 2026-04-26T12:55:00Z
1
value 0.00748
scoring_system epss
scoring_elements 0.73041
published_at 2026-04-01T12:55:00Z
2
value 0.00748
scoring_system epss
scoring_elements 0.73051
published_at 2026-04-02T12:55:00Z
3
value 0.00748
scoring_system epss
scoring_elements 0.73094
published_at 2026-04-13T12:55:00Z
4
value 0.00748
scoring_system epss
scoring_elements 0.73137
published_at 2026-04-16T12:55:00Z
5
value 0.00748
scoring_system epss
scoring_elements 0.73146
published_at 2026-04-18T12:55:00Z
6
value 0.00748
scoring_system epss
scoring_elements 0.73139
published_at 2026-04-21T12:55:00Z
7
value 0.00748
scoring_system epss
scoring_elements 0.73174
published_at 2026-04-24T12:55:00Z
8
value 0.00748
scoring_system epss
scoring_elements 0.73071
published_at 2026-04-04T12:55:00Z
9
value 0.00748
scoring_system epss
scoring_elements 0.73046
published_at 2026-04-07T12:55:00Z
10
value 0.00748
scoring_system epss
scoring_elements 0.73083
published_at 2026-04-08T12:55:00Z
11
value 0.00748
scoring_system epss
scoring_elements 0.73096
published_at 2026-04-09T12:55:00Z
12
value 0.00748
scoring_system epss
scoring_elements 0.73121
published_at 2026-04-11T12:55:00Z
13
value 0.00748
scoring_system epss
scoring_elements 0.731
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2638
2
reference_url http://www.securityfocus.com/bid/102546
reference_id 102546
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url http://www.securityfocus.com/bid/102546
3
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url http://www.securitytracker.com/id/1040203
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535350
reference_id 1535350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535350
5
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
6
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url https://access.redhat.com/errata/RHSA-2018:0099
8
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url https://access.redhat.com/errata/RHSA-2018:0351
9
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url https://access.redhat.com/errata/RHSA-2018:0352
10
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/
url https://access.redhat.com/errata/RHSA-2018:1463
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2638
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c1mn-fexd-p3dk
34
url VCID-cmr5-b3n9-6uhu
vulnerability_id VCID-cmr5-b3n9-6uhu
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3422
reference_id
reference_type
scores
0
value 0.03713
scoring_system epss
scoring_elements 0.87918
published_at 2026-04-01T12:55:00Z
1
value 0.03713
scoring_system epss
scoring_elements 0.87984
published_at 2026-04-11T12:55:00Z
2
value 0.03713
scoring_system epss
scoring_elements 0.87976
published_at 2026-04-12T12:55:00Z
3
value 0.03713
scoring_system epss
scoring_elements 0.87975
published_at 2026-04-13T12:55:00Z
4
value 0.03713
scoring_system epss
scoring_elements 0.8799
published_at 2026-04-16T12:55:00Z
5
value 0.03713
scoring_system epss
scoring_elements 0.87989
published_at 2026-04-18T12:55:00Z
6
value 0.03713
scoring_system epss
scoring_elements 0.87988
published_at 2026-04-21T12:55:00Z
7
value 0.03713
scoring_system epss
scoring_elements 0.88005
published_at 2026-04-24T12:55:00Z
8
value 0.03713
scoring_system epss
scoring_elements 0.88011
published_at 2026-04-26T12:55:00Z
9
value 0.03713
scoring_system epss
scoring_elements 0.87928
published_at 2026-04-02T12:55:00Z
10
value 0.03713
scoring_system epss
scoring_elements 0.87942
published_at 2026-04-04T12:55:00Z
11
value 0.03713
scoring_system epss
scoring_elements 0.87945
published_at 2026-04-07T12:55:00Z
12
value 0.03713
scoring_system epss
scoring_elements 0.87966
published_at 2026-04-08T12:55:00Z
13
value 0.03713
scoring_system epss
scoring_elements 0.87973
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3422
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
21
reference_url http://www.securityfocus.com/bid/86488
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://www.securityfocus.com/bid/86488
22
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url http://www.securitytracker.com/id/1035596
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328620
reference_id 1328620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328620
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3422
reference_id CVE-2016-3422
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-3422
31
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url https://security.gentoo.org/glsa/201606-18
32
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
33
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
34
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
35
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
36
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
37
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
38
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
39
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
40
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url https://access.redhat.com/errata/RHSA-2016:1430
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3422
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu
35
url VCID-cwm9-b8a3-skdz
vulnerability_id VCID-cwm9-b8a3-skdz
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2637
reference_id
reference_type
scores
0
value 0.02811
scoring_system epss
scoring_elements 0.86071
published_at 2026-04-01T12:55:00Z
1
value 0.02811
scoring_system epss
scoring_elements 0.86081
published_at 2026-04-02T12:55:00Z
2
value 0.02811
scoring_system epss
scoring_elements 0.86097
published_at 2026-04-07T12:55:00Z
3
value 0.02811
scoring_system epss
scoring_elements 0.86115
published_at 2026-04-08T12:55:00Z
4
value 0.02811
scoring_system epss
scoring_elements 0.86127
published_at 2026-04-09T12:55:00Z
5
value 0.02811
scoring_system epss
scoring_elements 0.86141
published_at 2026-04-11T12:55:00Z
6
value 0.02811
scoring_system epss
scoring_elements 0.8614
published_at 2026-04-12T12:55:00Z
7
value 0.02811
scoring_system epss
scoring_elements 0.86136
published_at 2026-04-13T12:55:00Z
8
value 0.02811
scoring_system epss
scoring_elements 0.86153
published_at 2026-04-16T12:55:00Z
9
value 0.02811
scoring_system epss
scoring_elements 0.86158
published_at 2026-04-18T12:55:00Z
10
value 0.02811
scoring_system epss
scoring_elements 0.8615
published_at 2026-04-21T12:55:00Z
11
value 0.02811
scoring_system epss
scoring_elements 0.86171
published_at 2026-04-24T12:55:00Z
12
value 0.02811
scoring_system epss
scoring_elements 0.86181
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2637
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243287
reference_id 1243287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243287
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
7
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
8
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
9
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
10
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
11
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2637
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwm9-b8a3-skdz
36
url VCID-dab9-tg36-93e3
vulnerability_id VCID-dab9-tg36-93e3
summary JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2964
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63207
published_at 2026-04-26T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63045
published_at 2026-04-01T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63104
published_at 2026-04-02T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63167
published_at 2026-04-09T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63185
published_at 2026-04-11T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-21T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63147
published_at 2026-04-13T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63182
published_at 2026-04-16T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.6319
published_at 2026-04-18T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63192
published_at 2026-04-24T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63134
published_at 2026-04-04T12:55:00Z
11
value 0.00439
scoring_system epss
scoring_elements 0.63098
published_at 2026-04-07T12:55:00Z
12
value 0.00439
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2964
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
5
reference_url http://www.securityfocus.com/bid/104780
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url http://www.securityfocus.com/bid/104780
6
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url http://www.securitytracker.com/id/1041302
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602142
reference_id 1602142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602142
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2964
reference_id CVE-2018-2964
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2964
29
reference_url https://access.redhat.com/errata/RHSA-2018:2253
reference_id RHSA-2018:2253
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url https://access.redhat.com/errata/RHSA-2018:2253
30
reference_url https://access.redhat.com/errata/RHSA-2018:2256
reference_id RHSA-2018:2256
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/
url https://access.redhat.com/errata/RHSA-2018:2256
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2964
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dab9-tg36-93e3
37
url VCID-dkzr-ncga-w3ex
vulnerability_id VCID-dkzr-ncga-w3ex
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2664
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36744
published_at 2026-04-01T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36901
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36932
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36764
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36815
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.3683
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36839
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36805
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.3678
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36827
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.3681
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.3675
published_at 2026-04-21T12:55:00Z
12
value 0.00159
scoring_system epss
scoring_elements 0.36527
published_at 2026-04-24T12:55:00Z
13
value 0.00159
scoring_system epss
scoring_elements 0.36496
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2664
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243300
reference_id 1243300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243300
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
7
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
8
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
9
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
10
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
11
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2664
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkzr-ncga-w3ex
38
url VCID-e6dm-6767-9kdk
vulnerability_id VCID-e6dm-6767-9kdk
summary openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32274
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32212
published_at 2026-04-09T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32185
published_at 2026-04-08T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32589
published_at 2026-04-21T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-26T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-16T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32619
published_at 2026-04-18T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32433
published_at 2026-04-24T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-11T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32631
published_at 2026-04-12T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
reference_id 2376785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
7
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
8
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
9
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
10
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
11
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
12
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
13
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
14
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
15
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
16
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
17
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
18
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
19
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
20
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
21
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
22
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2025-50059
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk
39
url VCID-edzj-4q7d-4bdj
vulnerability_id VCID-edzj-4q7d-4bdj
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10105
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55525
published_at 2026-04-24T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55543
published_at 2026-04-26T12:55:00Z
2
value 0.00499
scoring_system epss
scoring_elements 0.6586
published_at 2026-04-07T12:55:00Z
3
value 0.00499
scoring_system epss
scoring_elements 0.65864
published_at 2026-04-02T12:55:00Z
4
value 0.00499
scoring_system epss
scoring_elements 0.65922
published_at 2026-04-09T12:55:00Z
5
value 0.00499
scoring_system epss
scoring_elements 0.6594
published_at 2026-04-11T12:55:00Z
6
value 0.00499
scoring_system epss
scoring_elements 0.65927
published_at 2026-04-12T12:55:00Z
7
value 0.00499
scoring_system epss
scoring_elements 0.65898
published_at 2026-04-13T12:55:00Z
8
value 0.00499
scoring_system epss
scoring_elements 0.65932
published_at 2026-04-16T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65948
published_at 2026-04-18T12:55:00Z
10
value 0.00499
scoring_system epss
scoring_elements 0.65937
published_at 2026-04-21T12:55:00Z
11
value 0.00499
scoring_system epss
scoring_elements 0.65817
published_at 2026-04-01T12:55:00Z
12
value 0.00499
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-04T12:55:00Z
13
value 0.00499
scoring_system epss
scoring_elements 0.65912
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url http://www.securitytracker.com/id/1038931
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472667
reference_id 1472667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472667
5
reference_url http://www.securityfocus.com/bid/99851
reference_id 99851
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url http://www.securityfocus.com/bid/99851
6
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://security.gentoo.org/glsa/201709-22
7
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
8
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1790
9
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1791
10
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1792
11
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2469
12
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2481
13
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2530
14
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:3453
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-10105
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edzj-4q7d-4bdj
40
url VCID-eu23-93rk-pkaz
vulnerability_id VCID-eu23-93rk-pkaz
summary JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2657
reference_id
reference_type
scores
0
value 0.01002
scoring_system epss
scoring_elements 0.77048
published_at 2026-04-16T12:55:00Z
1
value 0.01002
scoring_system epss
scoring_elements 0.77077
published_at 2026-04-24T12:55:00Z
2
value 0.01002
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-13T12:55:00Z
3
value 0.01002
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-21T12:55:00Z
4
value 0.01002
scoring_system epss
scoring_elements 0.77084
published_at 2026-04-26T12:55:00Z
5
value 0.01002
scoring_system epss
scoring_elements 0.7705
published_at 2026-04-18T12:55:00Z
6
value 0.01289
scoring_system epss
scoring_elements 0.79616
published_at 2026-04-07T12:55:00Z
7
value 0.01289
scoring_system epss
scoring_elements 0.79607
published_at 2026-04-02T12:55:00Z
8
value 0.01289
scoring_system epss
scoring_elements 0.796
published_at 2026-04-01T12:55:00Z
9
value 0.01289
scoring_system epss
scoring_elements 0.79629
published_at 2026-04-04T12:55:00Z
10
value 0.01289
scoring_system epss
scoring_elements 0.79644
published_at 2026-04-08T12:55:00Z
11
value 0.01289
scoring_system epss
scoring_elements 0.79652
published_at 2026-04-09T12:55:00Z
12
value 0.01289
scoring_system epss
scoring_elements 0.79673
published_at 2026-04-11T12:55:00Z
13
value 0.01289
scoring_system epss
scoring_elements 0.79657
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2657
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/102629
reference_id 102629
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url http://www.securityfocus.com/bid/102629
4
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url http://www.securitytracker.com/id/1040203
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535353
reference_id 1535353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535353
6
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
7
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
8
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:0100
9
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:0115
10
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:0458
11
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:0521
12
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:1463
13
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/
url https://access.redhat.com/errata/RHSA-2018:1812
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2657
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu23-93rk-pkaz
41
url VCID-fa7w-w2jp-1kbk
vulnerability_id VCID-fa7w-w2jp-1kbk
summary JDK: unspecified vulnerability fixed in 6u201, 7u191, and 8u181 (Java DB)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2938
reference_id
reference_type
scores
0
value 0.00573
scoring_system epss
scoring_elements 0.68631
published_at 2026-04-01T12:55:00Z
1
value 0.00573
scoring_system epss
scoring_elements 0.6878
published_at 2026-04-26T12:55:00Z
2
value 0.00573
scoring_system epss
scoring_elements 0.68736
published_at 2026-04-11T12:55:00Z
3
value 0.00573
scoring_system epss
scoring_elements 0.68722
published_at 2026-04-12T12:55:00Z
4
value 0.00573
scoring_system epss
scoring_elements 0.68693
published_at 2026-04-13T12:55:00Z
5
value 0.00573
scoring_system epss
scoring_elements 0.68735
published_at 2026-04-16T12:55:00Z
6
value 0.00573
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-18T12:55:00Z
7
value 0.00573
scoring_system epss
scoring_elements 0.68725
published_at 2026-04-21T12:55:00Z
8
value 0.00573
scoring_system epss
scoring_elements 0.68774
published_at 2026-04-24T12:55:00Z
9
value 0.00573
scoring_system epss
scoring_elements 0.68648
published_at 2026-04-02T12:55:00Z
10
value 0.00573
scoring_system epss
scoring_elements 0.68667
published_at 2026-04-04T12:55:00Z
11
value 0.00573
scoring_system epss
scoring_elements 0.68644
published_at 2026-04-07T12:55:00Z
12
value 0.00573
scoring_system epss
scoring_elements 0.68695
published_at 2026-04-08T12:55:00Z
13
value 0.00573
scoring_system epss
scoring_elements 0.68713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2938
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
5
reference_url http://www.securityfocus.com/bid/104774
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/
url http://www.securityfocus.com/bid/104774
6
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/
url http://www.securitytracker.com/id/1041302
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602141
reference_id 1602141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602141
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2938
reference_id CVE-2018-2938
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2938
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2938
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fa7w-w2jp-1kbk
42
url VCID-fhch-983g-ryf2
vulnerability_id VCID-fhch-983g-ryf2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2638
reference_id
reference_type
scores
0
value 0.06794
scoring_system epss
scoring_elements 0.91272
published_at 2026-04-01T12:55:00Z
1
value 0.06794
scoring_system epss
scoring_elements 0.91277
published_at 2026-04-02T12:55:00Z
2
value 0.06794
scoring_system epss
scoring_elements 0.91287
published_at 2026-04-04T12:55:00Z
3
value 0.06794
scoring_system epss
scoring_elements 0.91293
published_at 2026-04-07T12:55:00Z
4
value 0.06794
scoring_system epss
scoring_elements 0.91305
published_at 2026-04-08T12:55:00Z
5
value 0.06794
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-09T12:55:00Z
6
value 0.06794
scoring_system epss
scoring_elements 0.91319
published_at 2026-04-11T12:55:00Z
7
value 0.06794
scoring_system epss
scoring_elements 0.91321
published_at 2026-04-12T12:55:00Z
8
value 0.06794
scoring_system epss
scoring_elements 0.9132
published_at 2026-04-13T12:55:00Z
9
value 0.06794
scoring_system epss
scoring_elements 0.91345
published_at 2026-04-21T12:55:00Z
10
value 0.06794
scoring_system epss
scoring_elements 0.91344
published_at 2026-04-18T12:55:00Z
11
value 0.06794
scoring_system epss
scoring_elements 0.91355
published_at 2026-04-24T12:55:00Z
12
value 0.06794
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2638
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243283
reference_id 1243283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243283
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
7
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
8
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
9
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
10
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
11
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2638
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhch-983g-ryf2
43
url VCID-gmsf-fz6q-xffa
vulnerability_id VCID-gmsf-fz6q-xffa
summary JDK: unspecified vulnerability fixed in 8u221 (Deployment)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2996
reference_id
reference_type
scores
0
value 0.02225
scoring_system epss
scoring_elements 0.84571
published_at 2026-04-26T12:55:00Z
1
value 0.02225
scoring_system epss
scoring_elements 0.84514
published_at 2026-04-13T12:55:00Z
2
value 0.02225
scoring_system epss
scoring_elements 0.84535
published_at 2026-04-18T12:55:00Z
3
value 0.02225
scoring_system epss
scoring_elements 0.84537
published_at 2026-04-21T12:55:00Z
4
value 0.02225
scoring_system epss
scoring_elements 0.84563
published_at 2026-04-24T12:55:00Z
5
value 0.02225
scoring_system epss
scoring_elements 0.84457
published_at 2026-04-02T12:55:00Z
6
value 0.02225
scoring_system epss
scoring_elements 0.84441
published_at 2026-04-01T12:55:00Z
7
value 0.02225
scoring_system epss
scoring_elements 0.84476
published_at 2026-04-04T12:55:00Z
8
value 0.02225
scoring_system epss
scoring_elements 0.84478
published_at 2026-04-07T12:55:00Z
9
value 0.02225
scoring_system epss
scoring_elements 0.84499
published_at 2026-04-08T12:55:00Z
10
value 0.02225
scoring_system epss
scoring_elements 0.84505
published_at 2026-04-09T12:55:00Z
11
value 0.02225
scoring_system epss
scoring_elements 0.84524
published_at 2026-04-11T12:55:00Z
12
value 0.02225
scoring_system epss
scoring_elements 0.84519
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2996
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1778942
reference_id 1778942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1778942
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2996
reference_id CVE-2019-2996
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2996
26
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url https://access.redhat.com/errata/RHSA-2019:4113
27
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url https://access.redhat.com/errata/RHSA-2019:4115
28
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url https://access.redhat.com/errata/RHSA-2020:0006
29
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/
url https://access.redhat.com/errata/RHSA-2020:0046
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2996
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsf-fz6q-xffa
44
url VCID-gst6-e8vf-jff8
vulnerability_id VCID-gst6-e8vf-jff8
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4288
reference_id
reference_type
scores
0
value 0.06948
scoring_system epss
scoring_elements 0.91459
published_at 2026-04-26T12:55:00Z
1
value 0.06948
scoring_system epss
scoring_elements 0.91462
published_at 2026-04-24T12:55:00Z
2
value 0.06948
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-01T12:55:00Z
3
value 0.06948
scoring_system epss
scoring_elements 0.91387
published_at 2026-04-02T12:55:00Z
4
value 0.06948
scoring_system epss
scoring_elements 0.91398
published_at 2026-04-04T12:55:00Z
5
value 0.06948
scoring_system epss
scoring_elements 0.91405
published_at 2026-04-07T12:55:00Z
6
value 0.06948
scoring_system epss
scoring_elements 0.91417
published_at 2026-04-08T12:55:00Z
7
value 0.06948
scoring_system epss
scoring_elements 0.91424
published_at 2026-04-09T12:55:00Z
8
value 0.06948
scoring_system epss
scoring_elements 0.9143
published_at 2026-04-11T12:55:00Z
9
value 0.06948
scoring_system epss
scoring_elements 0.91433
published_at 2026-04-12T12:55:00Z
10
value 0.06948
scoring_system epss
scoring_elements 0.91432
published_at 2026-04-13T12:55:00Z
11
value 0.06948
scoring_system epss
scoring_elements 0.91455
published_at 2026-04-16T12:55:00Z
12
value 0.06948
scoring_system epss
scoring_elements 0.91451
published_at 2026-04-18T12:55:00Z
13
value 0.06948
scoring_system epss
scoring_elements 0.91452
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4288
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
21
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
22
reference_url http://www.securityfocus.com/bid/70470
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70470
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152761
reference_id 1152761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152761
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4288
reference_id CVE-2014-4288
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4288
30
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
31
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
32
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
33
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
34
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
35
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
36
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
37
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-4288
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gst6-e8vf-jff8
45
url VCID-gwf2-u7vy-hqac
vulnerability_id VCID-gwf2-u7vy-hqac
summary JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Install)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2597
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.3091
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31038
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31085
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30903
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30961
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.3099
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.30951
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30906
published_at 2026-04-13T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30937
published_at 2026-04-16T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30917
published_at 2026-04-18T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.30883
published_at 2026-04-21T12:55:00Z
12
value 0.0012
scoring_system epss
scoring_elements 0.30722
published_at 2026-04-24T12:55:00Z
13
value 0.0012
scoring_system epss
scoring_elements 0.30605
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2597
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243285
reference_id 1243285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243285
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2597
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwf2-u7vy-hqac
46
url VCID-j4nj-26mu-p7a2
vulnerability_id VCID-j4nj-26mu-p7a2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0486
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.56853
published_at 2026-04-01T12:55:00Z
1
value 0.00343
scoring_system epss
scoring_elements 0.56948
published_at 2026-04-02T12:55:00Z
2
value 0.00343
scoring_system epss
scoring_elements 0.56969
published_at 2026-04-04T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.56945
published_at 2026-04-07T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.56996
published_at 2026-04-08T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.56999
published_at 2026-04-09T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.57007
published_at 2026-04-11T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.56986
published_at 2026-04-12T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56963
published_at 2026-04-13T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.56992
published_at 2026-04-16T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.56989
published_at 2026-04-18T12:55:00Z
11
value 0.00343
scoring_system epss
scoring_elements 0.56966
published_at 2026-04-21T12:55:00Z
12
value 0.00343
scoring_system epss
scoring_elements 0.56905
published_at 2026-04-24T12:55:00Z
13
value 0.00343
scoring_system epss
scoring_elements 0.56923
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0486
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211774
reference_id 1211774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211774
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0486
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4nj-26mu-p7a2
47
url VCID-j8w9-x9f9-hfec
vulnerability_id VCID-j8w9-x9f9-hfec
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4810
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24083
published_at 2026-04-01T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24213
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24249
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24148
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24165
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24067
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2408
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24068
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24051
published_at 2026-04-21T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23925
published_at 2026-04-24T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23912
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4810
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273858
reference_id 1273858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273858
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
5
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
6
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
7
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
8
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
9
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-4810
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8w9-x9f9-hfec
48
url VCID-jnkf-c6qq-77c2
vulnerability_id VCID-jnkf-c6qq-77c2
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2627
reference_id
reference_type
scores
0
value 0.00475
scoring_system epss
scoring_elements 0.64856
published_at 2026-04-26T12:55:00Z
1
value 0.00475
scoring_system epss
scoring_elements 0.64705
published_at 2026-04-01T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.64756
published_at 2026-04-02T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.64785
published_at 2026-04-04T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.64748
published_at 2026-04-07T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.64797
published_at 2026-04-08T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64812
published_at 2026-04-09T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64829
published_at 2026-04-11T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64818
published_at 2026-04-12T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64789
published_at 2026-04-13T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64827
published_at 2026-04-16T12:55:00Z
11
value 0.00475
scoring_system epss
scoring_elements 0.64838
published_at 2026-04-18T12:55:00Z
12
value 0.00475
scoring_system epss
scoring_elements 0.64825
published_at 2026-04-21T12:55:00Z
13
value 0.00475
scoring_system epss
scoring_elements 0.64843
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2627
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/102584
reference_id 102584
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/
url http://www.securityfocus.com/bid/102584
4
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/
url http://www.securitytracker.com/id/1040203
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535352
reference_id 1535352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535352
6
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
7
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
8
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/
url https://access.redhat.com/errata/RHSA-2018:0099
9
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/
url https://access.redhat.com/errata/RHSA-2018:1463
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2627
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnkf-c6qq-77c2
49
url VCID-kbur-d5ax-jqgk
vulnerability_id VCID-kbur-d5ax-jqgk
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6515
reference_id
reference_type
scores
0
value 0.03119
scoring_system epss
scoring_elements 0.86883
published_at 2026-04-26T12:55:00Z
1
value 0.03119
scoring_system epss
scoring_elements 0.86782
published_at 2026-04-01T12:55:00Z
2
value 0.03119
scoring_system epss
scoring_elements 0.86793
published_at 2026-04-02T12:55:00Z
3
value 0.03119
scoring_system epss
scoring_elements 0.86812
published_at 2026-04-04T12:55:00Z
4
value 0.03119
scoring_system epss
scoring_elements 0.86806
published_at 2026-04-07T12:55:00Z
5
value 0.03119
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-08T12:55:00Z
6
value 0.03119
scoring_system epss
scoring_elements 0.86834
published_at 2026-04-09T12:55:00Z
7
value 0.03119
scoring_system epss
scoring_elements 0.86847
published_at 2026-04-11T12:55:00Z
8
value 0.03119
scoring_system epss
scoring_elements 0.86843
published_at 2026-04-12T12:55:00Z
9
value 0.03119
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-13T12:55:00Z
10
value 0.03119
scoring_system epss
scoring_elements 0.86856
published_at 2026-04-16T12:55:00Z
11
value 0.03119
scoring_system epss
scoring_elements 0.8686
published_at 2026-04-21T12:55:00Z
12
value 0.03119
scoring_system epss
scoring_elements 0.86876
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6515
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
19
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
20
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
21
reference_url http://www.securityfocus.com/bid/70565
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70565
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152766
reference_id 1152766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152766
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6515
reference_id CVE-2014-6515
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-6515
28
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
29
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
30
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
31
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
32
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
33
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
34
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
35
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6515
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbur-d5ax-jqgk
50
url VCID-kbx9-qaje-37bs
vulnerability_id VCID-kbx9-qaje-37bs
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2699
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.7801
published_at 2026-04-26T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.7789
published_at 2026-04-02T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.7797
published_at 2026-04-21T12:55:00Z
3
value 0.0109
scoring_system epss
scoring_elements 0.78002
published_at 2026-04-24T12:55:00Z
4
value 0.0109
scoring_system epss
scoring_elements 0.77883
published_at 2026-04-01T12:55:00Z
5
value 0.0109
scoring_system epss
scoring_elements 0.77918
published_at 2026-04-04T12:55:00Z
6
value 0.0109
scoring_system epss
scoring_elements 0.77901
published_at 2026-04-07T12:55:00Z
7
value 0.0109
scoring_system epss
scoring_elements 0.77928
published_at 2026-04-08T12:55:00Z
8
value 0.0109
scoring_system epss
scoring_elements 0.77932
published_at 2026-04-09T12:55:00Z
9
value 0.0109
scoring_system epss
scoring_elements 0.77958
published_at 2026-04-11T12:55:00Z
10
value 0.0109
scoring_system epss
scoring_elements 0.77943
published_at 2026-04-12T12:55:00Z
11
value 0.0109
scoring_system epss
scoring_elements 0.77942
published_at 2026-04-13T12:55:00Z
12
value 0.0109
scoring_system epss
scoring_elements 0.77977
published_at 2026-04-16T12:55:00Z
13
value 0.0109
scoring_system epss
scoring_elements 0.77976
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2699
1
reference_url https://security.gentoo.org/glsa/201908-10
reference_id GLSA-201908-10
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/
url https://security.gentoo.org/glsa/201908-10
2
reference_url https://support.f5.com/csp/article/K02771314
reference_id K02771314
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/
url https://support.f5.com/csp/article/K02771314
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2699
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbx9-qaje-37bs
51
url VCID-kwca-ph6k-wqar
vulnerability_id VCID-kwca-ph6k-wqar
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6503
reference_id
reference_type
scores
0
value 0.09698
scoring_system epss
scoring_elements 0.92947
published_at 2026-04-26T12:55:00Z
1
value 0.09698
scoring_system epss
scoring_elements 0.92897
published_at 2026-04-01T12:55:00Z
2
value 0.09698
scoring_system epss
scoring_elements 0.92905
published_at 2026-04-02T12:55:00Z
3
value 0.09698
scoring_system epss
scoring_elements 0.92909
published_at 2026-04-04T12:55:00Z
4
value 0.09698
scoring_system epss
scoring_elements 0.92908
published_at 2026-04-07T12:55:00Z
5
value 0.09698
scoring_system epss
scoring_elements 0.92916
published_at 2026-04-08T12:55:00Z
6
value 0.09698
scoring_system epss
scoring_elements 0.9292
published_at 2026-04-09T12:55:00Z
7
value 0.09698
scoring_system epss
scoring_elements 0.92925
published_at 2026-04-11T12:55:00Z
8
value 0.09698
scoring_system epss
scoring_elements 0.92923
published_at 2026-04-12T12:55:00Z
9
value 0.09698
scoring_system epss
scoring_elements 0.92924
published_at 2026-04-13T12:55:00Z
10
value 0.09698
scoring_system epss
scoring_elements 0.92934
published_at 2026-04-16T12:55:00Z
11
value 0.09698
scoring_system epss
scoring_elements 0.92936
published_at 2026-04-18T12:55:00Z
12
value 0.09698
scoring_system epss
scoring_elements 0.92943
published_at 2026-04-21T12:55:00Z
13
value 0.09698
scoring_system epss
scoring_elements 0.92945
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6503
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
19
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
20
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
21
reference_url http://www.securityfocus.com/bid/70518
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70518
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152757
reference_id 1152757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152757
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6503
reference_id CVE-2014-6503
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6503
28
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
29
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
30
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
31
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
32
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
33
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
34
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
35
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6503
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwca-ph6k-wqar
52
url VCID-kzak-fju8-eqew
vulnerability_id VCID-kzak-fju8-eqew
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3259
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64669
published_at 2026-04-26T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64523
published_at 2026-04-01T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64576
published_at 2026-04-02T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64645
published_at 2026-04-11T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64633
published_at 2026-04-12T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-16T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64651
published_at 2026-04-18T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64637
published_at 2026-04-21T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64657
published_at 2026-04-24T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64605
published_at 2026-04-13T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.64563
published_at 2026-04-07T12:55:00Z
11
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-08T12:55:00Z
12
value 0.00471
scoring_system epss
scoring_elements 0.64628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3259
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://www.securitytracker.com/id/1037637
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414163
reference_id 1414163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414163
5
reference_url http://www.securityfocus.com/bid/95570
reference_id 95570
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://www.securityfocus.com/bid/95570
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
7
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url https://security.gentoo.org/glsa/201701-65
8
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
9
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
10
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
11
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
12
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
13
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
14
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
15
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
16
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
17
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
18
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
19
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
20
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
21
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
22
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
23
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-3259
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew
53
url VCID-msyp-df3m-gqdx
vulnerability_id VCID-msyp-df3m-gqdx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10125
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.41974
published_at 2026-04-26T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.41979
published_at 2026-04-24T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46556
published_at 2026-04-02T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46517
published_at 2026-04-01T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46575
published_at 2026-04-04T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55204
published_at 2026-04-16T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55165
published_at 2026-04-13T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55142
published_at 2026-04-07T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55191
published_at 2026-04-09T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55183
published_at 2026-04-12T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55203
published_at 2026-04-11T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.55186
published_at 2026-04-21T12:55:00Z
12
value 0.00321
scoring_system epss
scoring_elements 0.55207
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10125
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url http://www.securitytracker.com/id/1038931
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472664
reference_id 1472664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472664
5
reference_url http://www.securityfocus.com/bid/99809
reference_id 99809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url http://www.securityfocus.com/bid/99809
6
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url https://security.gentoo.org/glsa/201709-22
7
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-10125
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msyp-df3m-gqdx
54
url VCID-my4w-m69q-gfak
vulnerability_id VCID-my4w-m69q-gfak
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0603
reference_id
reference_type
scores
0
value 0.03
scoring_system epss
scoring_elements 0.86604
published_at 2026-04-26T12:55:00Z
1
value 0.03
scoring_system epss
scoring_elements 0.86505
published_at 2026-04-01T12:55:00Z
2
value 0.03
scoring_system epss
scoring_elements 0.86515
published_at 2026-04-02T12:55:00Z
3
value 0.03
scoring_system epss
scoring_elements 0.86534
published_at 2026-04-04T12:55:00Z
4
value 0.03
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-07T12:55:00Z
5
value 0.03
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-08T12:55:00Z
6
value 0.03
scoring_system epss
scoring_elements 0.86562
published_at 2026-04-09T12:55:00Z
7
value 0.03
scoring_system epss
scoring_elements 0.86577
published_at 2026-04-11T12:55:00Z
8
value 0.03
scoring_system epss
scoring_elements 0.86573
published_at 2026-04-12T12:55:00Z
9
value 0.03
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-13T12:55:00Z
10
value 0.03
scoring_system epss
scoring_elements 0.8658
published_at 2026-04-16T12:55:00Z
11
value 0.03
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-18T12:55:00Z
12
value 0.03
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-21T12:55:00Z
13
value 0.03
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0603
1
reference_url http://seclists.org/fulldisclosure/2016/Feb/54
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Feb/54
2
reference_url https://security.netapp.com/advisory/ntap-20160217-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160217-0001/
3
reference_url http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html
4
reference_url http://www.securityfocus.com/archive/1/537462/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/537462/100/0/threaded
5
reference_url http://www.securityfocus.com/bid/83008
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83008
6
reference_url http://www.securitytracker.com/id/1034969
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034969
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0603
reference_id CVE-2016-0603
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0603
16
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-0603
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my4w-m69q-gfak
55
url VCID-n3s6-1ba7-47g7
vulnerability_id VCID-n3s6-1ba7-47g7
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5556
reference_id
reference_type
scores
0
value 0.05068
scoring_system epss
scoring_elements 0.89816
published_at 2026-04-26T12:55:00Z
1
value 0.05068
scoring_system epss
scoring_elements 0.89793
published_at 2026-04-09T12:55:00Z
2
value 0.05068
scoring_system epss
scoring_elements 0.898
published_at 2026-04-11T12:55:00Z
3
value 0.05068
scoring_system epss
scoring_elements 0.89798
published_at 2026-04-12T12:55:00Z
4
value 0.05068
scoring_system epss
scoring_elements 0.89791
published_at 2026-04-13T12:55:00Z
5
value 0.05068
scoring_system epss
scoring_elements 0.89806
published_at 2026-04-18T12:55:00Z
6
value 0.05068
scoring_system epss
scoring_elements 0.89801
published_at 2026-04-21T12:55:00Z
7
value 0.05068
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-24T12:55:00Z
8
value 0.05068
scoring_system epss
scoring_elements 0.8975
published_at 2026-04-01T12:55:00Z
9
value 0.05068
scoring_system epss
scoring_elements 0.89753
published_at 2026-04-02T12:55:00Z
10
value 0.05068
scoring_system epss
scoring_elements 0.89767
published_at 2026-04-04T12:55:00Z
11
value 0.05068
scoring_system epss
scoring_elements 0.89769
published_at 2026-04-07T12:55:00Z
12
value 0.05068
scoring_system epss
scoring_elements 0.89787
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5556
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://www.securitytracker.com/id/1037040
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386408
reference_id 1386408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386408
5
reference_url http://www.securityfocus.com/bid/93618
reference_id 93618
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://www.securityfocus.com/bid/93618
6
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url https://security.gentoo.org/glsa/201611-04
7
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
8
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
10
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
12
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
14
reference_url https://access.redhat.com/errata/RHSA-2016:2136
reference_id RHSA-2016:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2136
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-2136.html
reference_id RHSA-2016-2136.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2136.html
16
reference_url https://access.redhat.com/errata/RHSA-2016:2137
reference_id RHSA-2016:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2137
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-2137.html
reference_id RHSA-2016-2137.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2137.html
18
reference_url https://access.redhat.com/errata/RHSA-2016:2138
reference_id RHSA-2016:2138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2138
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2138.html
reference_id RHSA-2016-2138.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2138.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2659
reference_id RHSA-2016:2659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2659
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2659.html
reference_id RHSA-2016-2659.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-2659.html
22
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-5556
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n3s6-1ba7-47g7
56
url VCID-n6gk-phrw-cbbw
vulnerability_id VCID-n6gk-phrw-cbbw
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3503
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-26T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.2523
published_at 2026-04-07T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.253
published_at 2026-04-08T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25345
published_at 2026-04-09T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25357
published_at 2026-04-11T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25315
published_at 2026-04-12T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25262
published_at 2026-04-18T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25271
published_at 2026-04-16T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25231
published_at 2026-04-21T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25189
published_at 2026-04-24T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.2535
published_at 2026-04-01T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.2542
published_at 2026-04-02T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25455
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3503
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
12
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://www.securityfocus.com/bid/91787
13
reference_url http://www.securityfocus.com/bid/91996
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://www.securityfocus.com/bid/91996
14
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url http://www.securitytracker.com/id/1036365
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358169
reference_id 1358169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358169
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3503
reference_id CVE-2016-3503
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3503
23
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url https://security.gentoo.org/glsa/201610-08
24
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url https://access.redhat.com/errata/RHSA-2016:1475
25
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url https://access.redhat.com/errata/RHSA-2016:1476
26
reference_url https://access.redhat.com/errata/RHSA-2016:1477
reference_id RHSA-2016:1477
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/
url https://access.redhat.com/errata/RHSA-2016:1477
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3503
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gk-phrw-cbbw
57
url VCID-nnks-uqvq-dubg
vulnerability_id VCID-nnks-uqvq-dubg
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2426
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67179
published_at 2026-04-26T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67045
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67082
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67142
published_at 2026-04-09T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.67161
published_at 2026-04-11T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67147
published_at 2026-04-12T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67116
published_at 2026-04-13T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.6715
published_at 2026-04-16T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67164
published_at 2026-04-18T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67145
published_at 2026-04-21T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67167
published_at 2026-04-24T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67106
published_at 2026-04-04T12:55:00Z
12
value 0.00527
scoring_system epss
scoring_elements 0.6708
published_at 2026-04-07T12:55:00Z
13
value 0.00527
scoring_system epss
scoring_elements 0.6713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2426
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.netapp.com/advisory/ntap-20190118-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url https://security.netapp.com/advisory/ntap-20190118-0001/
6
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
8
reference_url http://www.securityfocus.com/bid/106590
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url http://www.securityfocus.com/bid/106590
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665953
reference_id 1665953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665953
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2426
reference_id CVE-2019-2426
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2426
27
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/
url https://security.gentoo.org/glsa/201903-14
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2426
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnks-uqvq-dubg
58
url VCID-ntga-y6cv-a3df
vulnerability_id VCID-ntga-y6cv-a3df
summary openjdk: Enhance array handling (Oracle CPU 2025-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-02T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.41942
published_at 2026-04-26T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42078
published_at 2026-04-18T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42008
published_at 2026-04-21T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.41948
published_at 2026-04-24T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-04T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42029
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42081
published_at 2026-04-08T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42094
published_at 2026-04-09T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-11T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42079
published_at 2026-04-12T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.42054
published_at 2026-04-13T12:55:00Z
12
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
reference_id 2338992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:0421
reference_id RHSA-2025:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0421
17
reference_url https://access.redhat.com/errata/RHSA-2025:0422
reference_id RHSA-2025:0422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0422
18
reference_url https://access.redhat.com/errata/RHSA-2025:0423
reference_id RHSA-2025:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0423
19
reference_url https://access.redhat.com/errata/RHSA-2025:0424
reference_id RHSA-2025:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0424
20
reference_url https://access.redhat.com/errata/RHSA-2025:0425
reference_id RHSA-2025:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0425
21
reference_url https://access.redhat.com/errata/RHSA-2025:0426
reference_id RHSA-2025:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0426
22
reference_url https://access.redhat.com/errata/RHSA-2025:0427
reference_id RHSA-2025:0427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0427
23
reference_url https://access.redhat.com/errata/RHSA-2025:0428
reference_id RHSA-2025:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0428
24
reference_url https://access.redhat.com/errata/RHSA-2025:0429
reference_id RHSA-2025:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0429
25
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
26
reference_url https://access.redhat.com/errata/RHSA-2025:2615
reference_id RHSA-2025:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2615
27
reference_url https://usn.ubuntu.com/7252-1/
reference_id USN-7252-1
reference_type
scores
url https://usn.ubuntu.com/7252-1/
28
reference_url https://usn.ubuntu.com/7253-1/
reference_id USN-7253-1
reference_type
scores
url https://usn.ubuntu.com/7253-1/
29
reference_url https://usn.ubuntu.com/7254-1/
reference_id USN-7254-1
reference_type
scores
url https://usn.ubuntu.com/7254-1/
30
reference_url https://usn.ubuntu.com/7255-1/
reference_id USN-7255-1
reference_type
scores
url https://usn.ubuntu.com/7255-1/
31
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
32
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2025-21502
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df
59
url VCID-ntmk-ub1c-5ygz
vulnerability_id VCID-ntmk-ub1c-5ygz
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0403
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-21T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31358
published_at 2026-04-24T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31232
published_at 2026-04-26T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32319
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32395
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32397
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32309
published_at 2026-04-01T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32333
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32369
published_at 2026-04-16T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32346
published_at 2026-04-18T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.3236
published_at 2026-04-12T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.3246
published_at 2026-04-02T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.32496
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0403
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1184275
reference_id 1184275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1184275
3
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
4
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
5
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
6
reference_url https://access.redhat.com/errata/RHSA-2015:0086
reference_id RHSA-2015:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0086
7
reference_url https://access.redhat.com/errata/RHSA-2015:0133
reference_id RHSA-2015:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0133
8
reference_url https://access.redhat.com/errata/RHSA-2015:0134
reference_id RHSA-2015:0134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0134
9
reference_url https://access.redhat.com/errata/RHSA-2015:0135
reference_id RHSA-2015:0135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0135
10
reference_url https://access.redhat.com/errata/RHSA-2015:0263
reference_id RHSA-2015:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0263
11
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0403
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntmk-ub1c-5ygz
60
url VCID-pynq-sbec-akf8
vulnerability_id VCID-pynq-sbec-akf8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3552
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17802
published_at 2026-04-26T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17942
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17943
published_at 2026-04-08T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18004
published_at 2026-04-09T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.18021
published_at 2026-04-11T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17976
published_at 2026-04-12T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17927
published_at 2026-04-13T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.1787
published_at 2026-04-16T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1788
published_at 2026-04-18T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17917
published_at 2026-04-21T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17825
published_at 2026-04-24T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.18103
published_at 2026-04-02T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.18156
published_at 2026-04-04T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17856
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
8
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://www.securityfocus.com/bid/91787
9
reference_url http://www.securityfocus.com/bid/92000
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://www.securityfocus.com/bid/92000
10
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url http://www.securitytracker.com/id/1036365
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358167
reference_id 1358167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358167
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3552
reference_id CVE-2016-3552
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3552
15
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url https://security.gentoo.org/glsa/201610-08
16
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/
url https://access.redhat.com/errata/RHSA-2016:1475
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3552
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pynq-sbec-akf8
61
url VCID-qc7k-5py9-y7ab
vulnerability_id VCID-qc7k-5py9-y7ab
summary OpenJDK: Incorrect escaping of command line arguments in ProcessImpl on Windows (Libraries, 8221858)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2958
reference_id
reference_type
scores
0
value 0.01183
scoring_system epss
scoring_elements 0.78825
published_at 2026-04-26T12:55:00Z
1
value 0.01183
scoring_system epss
scoring_elements 0.78726
published_at 2026-04-02T12:55:00Z
2
value 0.01183
scoring_system epss
scoring_elements 0.78796
published_at 2026-04-18T12:55:00Z
3
value 0.01183
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-12T12:55:00Z
4
value 0.01183
scoring_system epss
scoring_elements 0.7877
published_at 2026-04-13T12:55:00Z
5
value 0.01183
scoring_system epss
scoring_elements 0.78798
published_at 2026-04-16T12:55:00Z
6
value 0.01183
scoring_system epss
scoring_elements 0.78791
published_at 2026-04-21T12:55:00Z
7
value 0.01183
scoring_system epss
scoring_elements 0.78819
published_at 2026-04-24T12:55:00Z
8
value 0.01183
scoring_system epss
scoring_elements 0.78718
published_at 2026-04-01T12:55:00Z
9
value 0.01183
scoring_system epss
scoring_elements 0.78757
published_at 2026-04-04T12:55:00Z
10
value 0.01183
scoring_system epss
scoring_elements 0.78739
published_at 2026-04-07T12:55:00Z
11
value 0.01183
scoring_system epss
scoring_elements 0.78765
published_at 2026-04-08T12:55:00Z
12
value 0.01183
scoring_system epss
scoring_elements 0.78772
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2958
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777929
reference_id 1777929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777929
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2958
reference_id CVE-2019-2958
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2958
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2958
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qc7k-5py9-y7ab
62
url VCID-qp1y-5scd-c7hy
vulnerability_id VCID-qp1y-5scd-c7hy
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1587.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://rhn.redhat.com/errata/RHSA-2016-1587.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-1588.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://rhn.redhat.com/errata/RHSA-2016-1588.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-1589.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://rhn.redhat.com/errata/RHSA-2016-1589.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3511
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23117
published_at 2026-04-26T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23345
published_at 2026-04-08T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23395
published_at 2026-04-09T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23414
published_at 2026-04-11T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23377
published_at 2026-04-12T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23323
published_at 2026-04-13T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.2334
published_at 2026-04-16T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23334
published_at 2026-04-18T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23316
published_at 2026-04-21T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23124
published_at 2026-04-24T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-01T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23451
published_at 2026-04-02T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23488
published_at 2026-04-04T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23272
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3511
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
17
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://www.securityfocus.com/bid/91787
18
reference_url http://www.securityfocus.com/bid/91990
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://www.securityfocus.com/bid/91990
19
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url http://www.securitytracker.com/id/1036365
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358168
reference_id 1358168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358168
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3511
reference_id CVE-2016-3511
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3511
26
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url https://security.gentoo.org/glsa/201610-08
27
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url https://access.redhat.com/errata/RHSA-2016:1475
28
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url https://access.redhat.com/errata/RHSA-2016:1476
29
reference_url https://access.redhat.com/errata/RHSA-2016:1587
reference_id RHSA-2016:1587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1587
30
reference_url https://access.redhat.com/errata/RHSA-2016:1588
reference_id RHSA-2016:1588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1588
31
reference_url https://access.redhat.com/errata/RHSA-2016:1589
reference_id RHSA-2016:1589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1589
32
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3511
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy
63
url VCID-qr8w-umju-9yfd
vulnerability_id VCID-qr8w-umju-9yfd
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6476
reference_id
reference_type
scores
0
value 0.04591
scoring_system epss
scoring_elements 0.89264
published_at 2026-04-26T12:55:00Z
1
value 0.04591
scoring_system epss
scoring_elements 0.89186
published_at 2026-04-01T12:55:00Z
2
value 0.04591
scoring_system epss
scoring_elements 0.89192
published_at 2026-04-02T12:55:00Z
3
value 0.04591
scoring_system epss
scoring_elements 0.89206
published_at 2026-04-04T12:55:00Z
4
value 0.04591
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-07T12:55:00Z
5
value 0.04591
scoring_system epss
scoring_elements 0.89226
published_at 2026-04-08T12:55:00Z
6
value 0.04591
scoring_system epss
scoring_elements 0.89231
published_at 2026-04-09T12:55:00Z
7
value 0.04591
scoring_system epss
scoring_elements 0.8924
published_at 2026-04-11T12:55:00Z
8
value 0.04591
scoring_system epss
scoring_elements 0.89237
published_at 2026-04-12T12:55:00Z
9
value 0.04591
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-13T12:55:00Z
10
value 0.04591
scoring_system epss
scoring_elements 0.89246
published_at 2026-04-18T12:55:00Z
11
value 0.04591
scoring_system epss
scoring_elements 0.89241
published_at 2026-04-21T12:55:00Z
12
value 0.04591
scoring_system epss
scoring_elements 0.89259
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6476
10
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
11
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
12
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
13
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
14
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
15
reference_url http://www.securityfocus.com/bid/70531
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70531
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152765
reference_id 1152765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152765
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6476
reference_id CVE-2014-6476
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-6476
22
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
23
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
24
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
25
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
26
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6476
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8w-umju-9yfd
64
url VCID-qs56-bnkb-buhu
vulnerability_id VCID-qs56-bnkb-buhu
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3449
reference_id
reference_type
scores
0
value 0.0409
scoring_system epss
scoring_elements 0.88523
published_at 2026-04-01T12:55:00Z
1
value 0.0409
scoring_system epss
scoring_elements 0.8857
published_at 2026-04-08T12:55:00Z
2
value 0.0409
scoring_system epss
scoring_elements 0.88575
published_at 2026-04-09T12:55:00Z
3
value 0.0409
scoring_system epss
scoring_elements 0.88587
published_at 2026-04-21T12:55:00Z
4
value 0.0409
scoring_system epss
scoring_elements 0.88579
published_at 2026-04-13T12:55:00Z
5
value 0.0409
scoring_system epss
scoring_elements 0.88593
published_at 2026-04-16T12:55:00Z
6
value 0.0409
scoring_system epss
scoring_elements 0.8859
published_at 2026-04-18T12:55:00Z
7
value 0.0409
scoring_system epss
scoring_elements 0.88603
published_at 2026-04-24T12:55:00Z
8
value 0.0409
scoring_system epss
scoring_elements 0.88609
published_at 2026-04-26T12:55:00Z
9
value 0.0409
scoring_system epss
scoring_elements 0.88531
published_at 2026-04-02T12:55:00Z
10
value 0.0409
scoring_system epss
scoring_elements 0.88548
published_at 2026-04-04T12:55:00Z
11
value 0.0409
scoring_system epss
scoring_elements 0.88552
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3449
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
21
reference_url http://www.securityfocus.com/bid/86485
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://www.securityfocus.com/bid/86485
22
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url http://www.securitytracker.com/id/1035596
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328619
reference_id 1328619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328619
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3449
reference_id CVE-2016-3449
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3449
31
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url https://security.gentoo.org/glsa/201606-18
32
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
33
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
34
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
35
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
36
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
37
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
38
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
39
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
40
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url https://access.redhat.com/errata/RHSA-2016:1430
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/
url https://access.redhat.com/errata/RHSA-2017:1216
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-3449
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu
65
url VCID-qtnv-wwec-gufw
vulnerability_id VCID-qtnv-wwec-gufw
summary JDK: unspecified vulnerability fixed in 7u191 and 8u181 (Windows DLL)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2942
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69546
published_at 2026-04-01T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69705
published_at 2026-04-26T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69643
published_at 2026-04-11T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69628
published_at 2026-04-12T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-13T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69654
published_at 2026-04-16T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69662
published_at 2026-04-18T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69644
published_at 2026-04-21T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-24T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.69558
published_at 2026-04-02T12:55:00Z
10
value 0.00605
scoring_system epss
scoring_elements 0.69574
published_at 2026-04-04T12:55:00Z
11
value 0.00605
scoring_system epss
scoring_elements 0.69553
published_at 2026-04-07T12:55:00Z
12
value 0.00605
scoring_system epss
scoring_elements 0.69604
published_at 2026-04-08T12:55:00Z
13
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2942
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
5
reference_url http://www.securityfocus.com/bid/104781
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/
url http://www.securityfocus.com/bid/104781
6
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/
url http://www.securitytracker.com/id/1041302
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602144
reference_id 1602144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602144
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2942
reference_id CVE-2018-2942
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2942
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-2942
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtnv-wwec-gufw
66
url VCID-rudc-b743-5uh8
vulnerability_id VCID-rudc-b743-5uh8
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3514
reference_id
reference_type
scores
0
value 0.01199
scoring_system epss
scoring_elements 0.78856
published_at 2026-04-01T12:55:00Z
1
value 0.01199
scoring_system epss
scoring_elements 0.78964
published_at 2026-04-26T12:55:00Z
2
value 0.01199
scoring_system epss
scoring_elements 0.78898
published_at 2026-04-08T12:55:00Z
3
value 0.01199
scoring_system epss
scoring_elements 0.78904
published_at 2026-04-09T12:55:00Z
4
value 0.01199
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-18T12:55:00Z
5
value 0.01199
scoring_system epss
scoring_elements 0.78912
published_at 2026-04-12T12:55:00Z
6
value 0.01199
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-13T12:55:00Z
7
value 0.01199
scoring_system epss
scoring_elements 0.78931
published_at 2026-04-16T12:55:00Z
8
value 0.01199
scoring_system epss
scoring_elements 0.78927
published_at 2026-04-21T12:55:00Z
9
value 0.01199
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-24T12:55:00Z
10
value 0.01199
scoring_system epss
scoring_elements 0.78863
published_at 2026-04-02T12:55:00Z
11
value 0.01199
scoring_system epss
scoring_elements 0.78892
published_at 2026-04-04T12:55:00Z
12
value 0.01199
scoring_system epss
scoring_elements 0.78873
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3514
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97729
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/
url http://www.securityfocus.com/bid/97729
5
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/
url http://www.securitytracker.com/id/1038286
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443469
reference_id 1443469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443469
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3514
reference_id CVE-2017-3514
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3514
15
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/
url https://security.gentoo.org/glsa/201705-03
16
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/
url https://security.gentoo.org/glsa/201707-01
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-3514
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rudc-b743-5uh8
67
url VCID-rzqe-8qgr-7fet
vulnerability_id VCID-rzqe-8qgr-7fet
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0491
reference_id
reference_type
scores
0
value 0.07853
scoring_system epss
scoring_elements 0.91963
published_at 2026-04-01T12:55:00Z
1
value 0.07853
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-02T12:55:00Z
2
value 0.07853
scoring_system epss
scoring_elements 0.91979
published_at 2026-04-04T12:55:00Z
3
value 0.07853
scoring_system epss
scoring_elements 0.91985
published_at 2026-04-07T12:55:00Z
4
value 0.07853
scoring_system epss
scoring_elements 0.91998
published_at 2026-04-08T12:55:00Z
5
value 0.07853
scoring_system epss
scoring_elements 0.92001
published_at 2026-04-13T12:55:00Z
6
value 0.07853
scoring_system epss
scoring_elements 0.92005
published_at 2026-04-11T12:55:00Z
7
value 0.07853
scoring_system epss
scoring_elements 0.92004
published_at 2026-04-12T12:55:00Z
8
value 0.07853
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-16T12:55:00Z
9
value 0.07853
scoring_system epss
scoring_elements 0.92016
published_at 2026-04-26T12:55:00Z
10
value 0.07853
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-21T12:55:00Z
11
value 0.07853
scoring_system epss
scoring_elements 0.92017
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0491
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211769
reference_id 1211769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211769
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
5
reference_url https://access.redhat.com/errata/RHSA-2015:0857
reference_id RHSA-2015:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0857
6
reference_url https://access.redhat.com/errata/RHSA-2015:0858
reference_id RHSA-2015:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0858
7
reference_url https://access.redhat.com/errata/RHSA-2015:1006
reference_id RHSA-2015:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1006
8
reference_url https://access.redhat.com/errata/RHSA-2015:1007
reference_id RHSA-2015:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1007
9
reference_url https://access.redhat.com/errata/RHSA-2015:1020
reference_id RHSA-2015:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1020
10
reference_url https://access.redhat.com/errata/RHSA-2015:1021
reference_id RHSA-2015:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1021
11
reference_url https://access.redhat.com/errata/RHSA-2015:1091
reference_id RHSA-2015:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1091
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0491
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqe-8qgr-7fet
68
url VCID-ubqp-f2qp-5qcn
vulnerability_id VCID-ubqp-f2qp-5qcn
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0458
reference_id
reference_type
scores
0
value 0.0746
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-01T12:55:00Z
1
value 0.0746
scoring_system epss
scoring_elements 0.91738
published_at 2026-04-02T12:55:00Z
2
value 0.0746
scoring_system epss
scoring_elements 0.91743
published_at 2026-04-04T12:55:00Z
3
value 0.0746
scoring_system epss
scoring_elements 0.91751
published_at 2026-04-07T12:55:00Z
4
value 0.0746
scoring_system epss
scoring_elements 0.91763
published_at 2026-04-08T12:55:00Z
5
value 0.0746
scoring_system epss
scoring_elements 0.9177
published_at 2026-04-09T12:55:00Z
6
value 0.0746
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-11T12:55:00Z
7
value 0.0746
scoring_system epss
scoring_elements 0.91775
published_at 2026-04-12T12:55:00Z
8
value 0.0746
scoring_system epss
scoring_elements 0.91771
published_at 2026-04-13T12:55:00Z
9
value 0.0746
scoring_system epss
scoring_elements 0.91791
published_at 2026-04-26T12:55:00Z
10
value 0.0746
scoring_system epss
scoring_elements 0.91784
published_at 2026-04-18T12:55:00Z
11
value 0.0746
scoring_system epss
scoring_elements 0.91785
published_at 2026-04-21T12:55:00Z
12
value 0.0746
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0458
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211771
reference_id 1211771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211771
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
5
reference_url https://access.redhat.com/errata/RHSA-2015:0857
reference_id RHSA-2015:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0857
6
reference_url https://access.redhat.com/errata/RHSA-2015:0858
reference_id RHSA-2015:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0858
7
reference_url https://access.redhat.com/errata/RHSA-2015:1006
reference_id RHSA-2015:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1006
8
reference_url https://access.redhat.com/errata/RHSA-2015:1007
reference_id RHSA-2015:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1007
9
reference_url https://access.redhat.com/errata/RHSA-2015:1020
reference_id RHSA-2015:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1020
10
reference_url https://access.redhat.com/errata/RHSA-2015:1091
reference_id RHSA-2015:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1091
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0458
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubqp-f2qp-5qcn
69
url VCID-ue2f-emuu-43af
vulnerability_id VCID-ue2f-emuu-43af
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6527
reference_id
reference_type
scores
0
value 0.02656
scoring_system epss
scoring_elements 0.85828
published_at 2026-04-26T12:55:00Z
1
value 0.02656
scoring_system epss
scoring_elements 0.85704
published_at 2026-04-01T12:55:00Z
2
value 0.02656
scoring_system epss
scoring_elements 0.85716
published_at 2026-04-02T12:55:00Z
3
value 0.02656
scoring_system epss
scoring_elements 0.85734
published_at 2026-04-04T12:55:00Z
4
value 0.02656
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-07T12:55:00Z
5
value 0.02656
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-08T12:55:00Z
6
value 0.02656
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-09T12:55:00Z
7
value 0.02656
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-11T12:55:00Z
8
value 0.02656
scoring_system epss
scoring_elements 0.85782
published_at 2026-04-12T12:55:00Z
9
value 0.02656
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-13T12:55:00Z
10
value 0.02656
scoring_system epss
scoring_elements 0.85797
published_at 2026-04-16T12:55:00Z
11
value 0.02656
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-18T12:55:00Z
12
value 0.02656
scoring_system epss
scoring_elements 0.85795
published_at 2026-04-21T12:55:00Z
13
value 0.02656
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6527
10
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
11
reference_url http://secunia.com/advisories/61346
reference_id
reference_type
scores
url http://secunia.com/advisories/61346
12
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
13
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
14
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
15
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
16
reference_url http://www.securityfocus.com/bid/70560
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70560
17
reference_url http://www.ubuntu.com/usn/USN-2388-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2388-1
18
reference_url http://www.ubuntu.com/usn/USN-2388-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2388-2
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152767
reference_id 1152767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152767
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6527
reference_id CVE-2014-6527
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-6527
23
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
24
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
25
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
26
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
27
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
28
reference_url https://usn.ubuntu.com/2388-1/
reference_id USN-2388-1
reference_type
scores
url https://usn.ubuntu.com/2388-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6527
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ue2f-emuu-43af
70
url VCID-uhsa-uttv-mfes
vulnerability_id VCID-uhsa-uttv-mfes
summary
Multiple vulnerabilities have been found in Oracle's Java SE
    Development Kit and Runtime Environment, the worst of which could lead to
    execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
5
reference_url http://marc.info/?l=bugtraq&m=141775382904016&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775382904016&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-1657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1657.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1658.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1658.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6492
reference_id
reference_type
scores
0
value 0.01723
scoring_system epss
scoring_elements 0.82482
published_at 2026-04-26T12:55:00Z
1
value 0.01723
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-01T12:55:00Z
2
value 0.01723
scoring_system epss
scoring_elements 0.82351
published_at 2026-04-02T12:55:00Z
3
value 0.01723
scoring_system epss
scoring_elements 0.82369
published_at 2026-04-04T12:55:00Z
4
value 0.01723
scoring_system epss
scoring_elements 0.82364
published_at 2026-04-07T12:55:00Z
5
value 0.01723
scoring_system epss
scoring_elements 0.82392
published_at 2026-04-08T12:55:00Z
6
value 0.01723
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-09T12:55:00Z
7
value 0.01723
scoring_system epss
scoring_elements 0.82418
published_at 2026-04-11T12:55:00Z
8
value 0.01723
scoring_system epss
scoring_elements 0.82415
published_at 2026-04-12T12:55:00Z
9
value 0.01723
scoring_system epss
scoring_elements 0.82409
published_at 2026-04-13T12:55:00Z
10
value 0.01723
scoring_system epss
scoring_elements 0.82444
published_at 2026-04-16T12:55:00Z
11
value 0.01723
scoring_system epss
scoring_elements 0.82446
published_at 2026-04-18T12:55:00Z
12
value 0.01723
scoring_system epss
scoring_elements 0.8245
published_at 2026-04-21T12:55:00Z
13
value 0.01723
scoring_system epss
scoring_elements 0.82472
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6492
15
reference_url http://secunia.com/advisories/61163
reference_id
reference_type
scores
url http://secunia.com/advisories/61163
16
reference_url http://secunia.com/advisories/61164
reference_id
reference_type
scores
url http://secunia.com/advisories/61164
17
reference_url http://secunia.com/advisories/61609
reference_id
reference_type
scores
url http://secunia.com/advisories/61609
18
reference_url http://security.gentoo.org/glsa/glsa-201502-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-12.xml
19
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
20
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
21
reference_url http://www.securityfocus.com/bid/70456
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70456
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152759
reference_id 1152759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152759
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6492
reference_id CVE-2014-6492
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-6492
30
reference_url https://security.gentoo.org/glsa/201502-12
reference_id GLSA-201502-12
reference_type
scores
url https://security.gentoo.org/glsa/201502-12
31
reference_url https://access.redhat.com/errata/RHSA-2014:1657
reference_id RHSA-2014:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1657
32
reference_url https://access.redhat.com/errata/RHSA-2014:1658
reference_id RHSA-2014:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1658
33
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
34
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
35
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
36
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
37
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2014-6492
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhsa-uttv-mfes
71
url VCID-umzv-dbgt-c7hu
vulnerability_id VCID-umzv-dbgt-c7hu
summary
Sparkle Signing Checks Bypass
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0509
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2179
published_at 2026-04-08T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21579
published_at 2026-04-26T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21818
published_at 2026-04-12T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21858
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21947
published_at 2026-04-04T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-07T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21847
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21585
published_at 2026-04-24T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21732
published_at 2026-04-21T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21767
published_at 2026-04-18T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.2176
published_at 2026-04-16T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21893
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0509
1
reference_url https://github.com/sparkle-project/Sparkle
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparkle-project/Sparkle
2
reference_url https://github.com/sparkle-project/Sparkle/pull/2550
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/
url https://github.com/sparkle-project/Sparkle/pull/2550
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-0509
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-0509
4
reference_url https://security.netapp.com/advisory/ntap-20250124-0008
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250124-0008
5
reference_url https://sparkle-project.org/documentation/security-and-reliability
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://sparkle-project.org/documentation/security-and-reliability
6
reference_url https://sparkle-project.org/documentation/security-and-reliability/
reference_id security-and-reliability
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/
url https://sparkle-project.org/documentation/security-and-reliability/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2025-0509, GHSA-wc9m-r3v6-9p5h
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umzv-dbgt-c7hu
72
url VCID-upgw-aw1e-m7g6
vulnerability_id VCID-upgw-aw1e-m7g6
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8328
reference_id
reference_type
scores
0
value 0.00558
scoring_system epss
scoring_elements 0.68304
published_at 2026-04-26T12:55:00Z
1
value 0.00558
scoring_system epss
scoring_elements 0.68162
published_at 2026-04-01T12:55:00Z
2
value 0.00558
scoring_system epss
scoring_elements 0.68258
published_at 2026-04-12T12:55:00Z
3
value 0.00558
scoring_system epss
scoring_elements 0.68224
published_at 2026-04-13T12:55:00Z
4
value 0.00558
scoring_system epss
scoring_elements 0.68263
published_at 2026-04-16T12:55:00Z
5
value 0.00558
scoring_system epss
scoring_elements 0.68274
published_at 2026-04-18T12:55:00Z
6
value 0.00558
scoring_system epss
scoring_elements 0.68254
published_at 2026-04-21T12:55:00Z
7
value 0.00558
scoring_system epss
scoring_elements 0.68296
published_at 2026-04-24T12:55:00Z
8
value 0.00558
scoring_system epss
scoring_elements 0.68185
published_at 2026-04-02T12:55:00Z
9
value 0.00558
scoring_system epss
scoring_elements 0.68202
published_at 2026-04-04T12:55:00Z
10
value 0.00558
scoring_system epss
scoring_elements 0.6818
published_at 2026-04-07T12:55:00Z
11
value 0.00558
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-08T12:55:00Z
12
value 0.00558
scoring_system epss
scoring_elements 0.68246
published_at 2026-04-09T12:55:00Z
13
value 0.00558
scoring_system epss
scoring_elements 0.68271
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url http://www.securitytracker.com/id/1037637
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414164
reference_id 1414164
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414164
5
reference_url http://www.securityfocus.com/bid/95581
reference_id 95581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url http://www.securityfocus.com/bid/95581
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
7
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url https://security.gentoo.org/glsa/201701-65
8
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
9
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
10
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2016-8328
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upgw-aw1e-m7g6
73
url VCID-w2ja-cauk-8ke2
vulnerability_id VCID-w2ja-cauk-8ke2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0459
reference_id
reference_type
scores
0
value 0.10041
scoring_system epss
scoring_elements 0.93038
published_at 2026-04-01T12:55:00Z
1
value 0.10041
scoring_system epss
scoring_elements 0.93047
published_at 2026-04-02T12:55:00Z
2
value 0.10041
scoring_system epss
scoring_elements 0.93051
published_at 2026-04-04T12:55:00Z
3
value 0.10041
scoring_system epss
scoring_elements 0.9305
published_at 2026-04-07T12:55:00Z
4
value 0.10041
scoring_system epss
scoring_elements 0.93058
published_at 2026-04-08T12:55:00Z
5
value 0.10041
scoring_system epss
scoring_elements 0.93063
published_at 2026-04-09T12:55:00Z
6
value 0.10041
scoring_system epss
scoring_elements 0.93068
published_at 2026-04-11T12:55:00Z
7
value 0.10041
scoring_system epss
scoring_elements 0.93066
published_at 2026-04-12T12:55:00Z
8
value 0.10041
scoring_system epss
scoring_elements 0.93067
published_at 2026-04-13T12:55:00Z
9
value 0.10041
scoring_system epss
scoring_elements 0.93078
published_at 2026-04-16T12:55:00Z
10
value 0.10041
scoring_system epss
scoring_elements 0.93083
published_at 2026-04-18T12:55:00Z
11
value 0.10041
scoring_system epss
scoring_elements 0.93088
published_at 2026-04-21T12:55:00Z
12
value 0.10041
scoring_system epss
scoring_elements 0.93094
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0459
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211768
reference_id 1211768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211768
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:0854
reference_id RHSA-2015:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0854
5
reference_url https://access.redhat.com/errata/RHSA-2015:0857
reference_id RHSA-2015:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0857
6
reference_url https://access.redhat.com/errata/RHSA-2015:0858
reference_id RHSA-2015:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0858
7
reference_url https://access.redhat.com/errata/RHSA-2015:1006
reference_id RHSA-2015:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1006
8
reference_url https://access.redhat.com/errata/RHSA-2015:1007
reference_id RHSA-2015:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1007
9
reference_url https://access.redhat.com/errata/RHSA-2015:1020
reference_id RHSA-2015:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1020
10
reference_url https://access.redhat.com/errata/RHSA-2015:1021
reference_id RHSA-2015:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1021
11
reference_url https://access.redhat.com/errata/RHSA-2015:1091
reference_id RHSA-2015:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1091
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0459
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ja-cauk-8ke2
74
url VCID-xry5-hzk4-b3b8
vulnerability_id VCID-xry5-hzk4-b3b8
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0406
reference_id
reference_type
scores
0
value 0.05843
scoring_system epss
scoring_elements 0.90502
published_at 2026-04-01T12:55:00Z
1
value 0.05843
scoring_system epss
scoring_elements 0.90506
published_at 2026-04-02T12:55:00Z
2
value 0.05843
scoring_system epss
scoring_elements 0.90517
published_at 2026-04-04T12:55:00Z
3
value 0.05843
scoring_system epss
scoring_elements 0.90523
published_at 2026-04-07T12:55:00Z
4
value 0.05843
scoring_system epss
scoring_elements 0.90535
published_at 2026-04-08T12:55:00Z
5
value 0.05843
scoring_system epss
scoring_elements 0.90541
published_at 2026-04-09T12:55:00Z
6
value 0.05843
scoring_system epss
scoring_elements 0.9055
published_at 2026-04-11T12:55:00Z
7
value 0.05843
scoring_system epss
scoring_elements 0.90549
published_at 2026-04-12T12:55:00Z
8
value 0.05843
scoring_system epss
scoring_elements 0.90543
published_at 2026-04-13T12:55:00Z
9
value 0.05843
scoring_system epss
scoring_elements 0.90561
published_at 2026-04-16T12:55:00Z
10
value 0.05843
scoring_system epss
scoring_elements 0.9056
published_at 2026-04-18T12:55:00Z
11
value 0.05843
scoring_system epss
scoring_elements 0.90559
published_at 2026-04-21T12:55:00Z
12
value 0.05843
scoring_system epss
scoring_elements 0.90574
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0406
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1184277
reference_id 1184277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1184277
3
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
4
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
5
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
6
reference_url https://access.redhat.com/errata/RHSA-2015:0086
reference_id RHSA-2015:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0086
7
reference_url https://access.redhat.com/errata/RHSA-2015:0133
reference_id RHSA-2015:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0133
8
reference_url https://access.redhat.com/errata/RHSA-2015:0134
reference_id RHSA-2015:0134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0134
9
reference_url https://access.redhat.com/errata/RHSA-2015:0135
reference_id RHSA-2015:0135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0135
10
reference_url https://access.redhat.com/errata/RHSA-2015:0263
reference_id RHSA-2015:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0263
11
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0406
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xry5-hzk4-b3b8
75
url VCID-xwtx-qzfe-duac
vulnerability_id VCID-xwtx-qzfe-duac
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3262
reference_id
reference_type
scores
0
value 0.00663
scoring_system epss
scoring_elements 0.71126
published_at 2026-04-02T12:55:00Z
1
value 0.00663
scoring_system epss
scoring_elements 0.71258
published_at 2026-04-26T12:55:00Z
2
value 0.00663
scoring_system epss
scoring_elements 0.71117
published_at 2026-04-01T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-12T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71166
published_at 2026-04-13T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-16T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71219
published_at 2026-04-18T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.71196
published_at 2026-04-21T12:55:00Z
8
value 0.00663
scoring_system epss
scoring_elements 0.7125
published_at 2026-04-24T12:55:00Z
9
value 0.00663
scoring_system epss
scoring_elements 0.71144
published_at 2026-04-04T12:55:00Z
10
value 0.00663
scoring_system epss
scoring_elements 0.71119
published_at 2026-04-07T12:55:00Z
11
value 0.00663
scoring_system epss
scoring_elements 0.71161
published_at 2026-04-08T12:55:00Z
12
value 0.00663
scoring_system epss
scoring_elements 0.71173
published_at 2026-04-09T12:55:00Z
13
value 0.00663
scoring_system epss
scoring_elements 0.71197
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3262
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url http://www.securitytracker.com/id/1037637
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414162
reference_id 1414162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414162
5
reference_url http://www.securityfocus.com/bid/95578
reference_id 95578
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url http://www.securityfocus.com/bid/95578
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
7
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url https://security.gentoo.org/glsa/201701-65
8
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
9
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
10
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2017-3262
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtx-qzfe-duac
76
url VCID-xx59-6jd1-wbdr
vulnerability_id VCID-xx59-6jd1-wbdr
summary OpenJDK: Insufficient permission checks for file:// URLs on Windows (Networking, 8213431)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2766
reference_id
reference_type
scores
0
value 0.01014
scoring_system epss
scoring_elements 0.77214
published_at 2026-04-26T12:55:00Z
1
value 0.01014
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-18T12:55:00Z
2
value 0.01014
scoring_system epss
scoring_elements 0.77172
published_at 2026-04-21T12:55:00Z
3
value 0.01014
scoring_system epss
scoring_elements 0.77207
published_at 2026-04-24T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.7874
published_at 2026-04-13T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78769
published_at 2026-04-16T12:55:00Z
6
value 0.01649
scoring_system epss
scoring_elements 0.81968
published_at 2026-04-04T12:55:00Z
7
value 0.01649
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-07T12:55:00Z
8
value 0.01649
scoring_system epss
scoring_elements 0.81991
published_at 2026-04-08T12:55:00Z
9
value 0.01649
scoring_system epss
scoring_elements 0.81934
published_at 2026-04-01T12:55:00Z
10
value 0.01649
scoring_system epss
scoring_elements 0.82018
published_at 2026-04-11T12:55:00Z
11
value 0.01649
scoring_system epss
scoring_elements 0.82006
published_at 2026-04-12T12:55:00Z
12
value 0.01649
scoring_system epss
scoring_elements 0.81998
published_at 2026-04-09T12:55:00Z
13
value 0.01649
scoring_system epss
scoring_elements 0.81945
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2766
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730459
reference_id 1730459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1730459
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
5
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10300
reference_id index?page=content&id=SB10300
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10300
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2019-2766
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx59-6jd1-wbdr
77
url VCID-y1a8-8hmg-w3e3
vulnerability_id VCID-y1a8-8hmg-w3e3
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4729
reference_id
reference_type
scores
0
value 0.02597
scoring_system epss
scoring_elements 0.85532
published_at 2026-04-01T12:55:00Z
1
value 0.02597
scoring_system epss
scoring_elements 0.85544
published_at 2026-04-02T12:55:00Z
2
value 0.02597
scoring_system epss
scoring_elements 0.85562
published_at 2026-04-04T12:55:00Z
3
value 0.02597
scoring_system epss
scoring_elements 0.85567
published_at 2026-04-07T12:55:00Z
4
value 0.02597
scoring_system epss
scoring_elements 0.85587
published_at 2026-04-08T12:55:00Z
5
value 0.02597
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-09T12:55:00Z
6
value 0.02597
scoring_system epss
scoring_elements 0.85612
published_at 2026-04-11T12:55:00Z
7
value 0.02597
scoring_system epss
scoring_elements 0.85608
published_at 2026-04-12T12:55:00Z
8
value 0.02597
scoring_system epss
scoring_elements 0.85604
published_at 2026-04-13T12:55:00Z
9
value 0.02597
scoring_system epss
scoring_elements 0.85627
published_at 2026-04-16T12:55:00Z
10
value 0.02597
scoring_system epss
scoring_elements 0.85632
published_at 2026-04-18T12:55:00Z
11
value 0.02597
scoring_system epss
scoring_elements 0.85629
published_at 2026-04-21T12:55:00Z
12
value 0.02597
scoring_system epss
scoring_elements 0.8565
published_at 2026-04-24T12:55:00Z
13
value 0.02597
scoring_system epss
scoring_elements 0.85661
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4729
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243290
reference_id 1243290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243290
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
7
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-4729
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1a8-8hmg-w3e3
78
url VCID-yw9c-x1mv-3beb
vulnerability_id VCID-yw9c-x1mv-3beb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2619
reference_id
reference_type
scores
0
value 0.02242
scoring_system epss
scoring_elements 0.84488
published_at 2026-04-01T12:55:00Z
1
value 0.02242
scoring_system epss
scoring_elements 0.84504
published_at 2026-04-02T12:55:00Z
2
value 0.02242
scoring_system epss
scoring_elements 0.84525
published_at 2026-04-04T12:55:00Z
3
value 0.02242
scoring_system epss
scoring_elements 0.84528
published_at 2026-04-07T12:55:00Z
4
value 0.02242
scoring_system epss
scoring_elements 0.84549
published_at 2026-04-08T12:55:00Z
5
value 0.02242
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-09T12:55:00Z
6
value 0.02242
scoring_system epss
scoring_elements 0.84574
published_at 2026-04-11T12:55:00Z
7
value 0.02242
scoring_system epss
scoring_elements 0.84569
published_at 2026-04-12T12:55:00Z
8
value 0.02242
scoring_system epss
scoring_elements 0.84565
published_at 2026-04-13T12:55:00Z
9
value 0.02242
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-18T12:55:00Z
10
value 0.02242
scoring_system epss
scoring_elements 0.84586
published_at 2026-04-21T12:55:00Z
11
value 0.02242
scoring_system epss
scoring_elements 0.84613
published_at 2026-04-24T12:55:00Z
12
value 0.02242
scoring_system epss
scoring_elements 0.84621
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2619
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243286
reference_id 1243286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243286
3
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
4
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
5
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
6
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
7
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-2619
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw9c-x1mv-3beb
79
url VCID-z5kk-krqv-37aa
vulnerability_id VCID-z5kk-krqv-37aa
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3211
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40288
published_at 2026-04-26T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40407
published_at 2026-04-01T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40495
published_at 2026-04-02T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40489
published_at 2026-04-12T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-13T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40517
published_at 2026-04-16T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40486
published_at 2026-04-18T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40409
published_at 2026-04-21T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40299
published_at 2026-04-24T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40522
published_at 2026-04-04T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40443
published_at 2026-04-07T12:55:00Z
11
value 0.00187
scoring_system epss
scoring_elements 0.40494
published_at 2026-04-08T12:55:00Z
12
value 0.00187
scoring_system epss
scoring_elements 0.40505
published_at 2026-04-09T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40526
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3211
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105591
reference_id 105591
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/
url http://www.securityfocus.com/bid/105591
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1639906
reference_id 1639906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1639906
5
reference_url https://security.gentoo.org/glsa/201908-10
reference_id GLSA-201908-10
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/
url https://security.gentoo.org/glsa/201908-10
6
reference_url https://access.redhat.com/errata/RHSA-2018:3002
reference_id RHSA-2018:3002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/
url https://access.redhat.com/errata/RHSA-2018:3002
7
reference_url https://access.redhat.com/errata/RHSA-2018:3003
reference_id RHSA-2018:3003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/
url https://access.redhat.com/errata/RHSA-2018:3003
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2018-3211
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5kk-krqv-37aa
80
url VCID-ztyf-ukmt-63b3
vulnerability_id VCID-ztyf-ukmt-63b3
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0400
reference_id
reference_type
scores
0
value 0.01528
scoring_system epss
scoring_elements 0.81234
published_at 2026-04-01T12:55:00Z
1
value 0.01528
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-02T12:55:00Z
2
value 0.01528
scoring_system epss
scoring_elements 0.81266
published_at 2026-04-04T12:55:00Z
3
value 0.01528
scoring_system epss
scoring_elements 0.81265
published_at 2026-04-07T12:55:00Z
4
value 0.01528
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-08T12:55:00Z
5
value 0.01528
scoring_system epss
scoring_elements 0.81298
published_at 2026-04-09T12:55:00Z
6
value 0.01528
scoring_system epss
scoring_elements 0.81319
published_at 2026-04-11T12:55:00Z
7
value 0.01528
scoring_system epss
scoring_elements 0.81305
published_at 2026-04-12T12:55:00Z
8
value 0.01528
scoring_system epss
scoring_elements 0.81297
published_at 2026-04-13T12:55:00Z
9
value 0.01528
scoring_system epss
scoring_elements 0.81334
published_at 2026-04-16T12:55:00Z
10
value 0.01528
scoring_system epss
scoring_elements 0.81336
published_at 2026-04-21T12:55:00Z
11
value 0.01528
scoring_system epss
scoring_elements 0.81359
published_at 2026-04-24T12:55:00Z
12
value 0.01528
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0400
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1183039
reference_id 1183039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1183039
3
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
4
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
5
reference_url https://usn.ubuntu.com/2486-1/
reference_id USN-2486-1
reference_type
scores
url https://usn.ubuntu.com/2486-1/
6
reference_url https://usn.ubuntu.com/2487-1/
reference_id USN-2487-1
reference_type
scores
url https://usn.ubuntu.com/2487-1/
fixed_packages
0
url pkg:deb/debian/openjdk-8@0?distro=sid
purl pkg:deb/debian/openjdk-8@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
purl pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid
aliases CVE-2015-0400
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyf-ukmt-63b3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid