Lookup for vulnerable packages by Package URL.

GET /api/packages/933673?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "openjdk-8",
    "version": "0",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "7u95-2.6.4-1",
    "latest_non_vulnerable_version": "8u482-ga-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42568?format=api",
            "vulnerability_id": "VCID-13cc-fgdq-jygw",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92947",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92897",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92908",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92916",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9292",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92925",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92923",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92924",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92934",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92936",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92943",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92945",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6493"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70468"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152760",
                    "reference_id": "1152760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152760"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6493",
                    "reference_id": "CVE-2014-6493",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6493"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6493"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13cc-fgdq-jygw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38560?format=api",
            "vulnerability_id": "VCID-142k-d9mj-1kcj",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12947",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.131",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13178",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13139",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13088",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12988",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12991",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13089",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13083",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13051",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13076",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3485"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357516",
                    "reference_id": "1357516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357516"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3485",
                    "reference_id": "CVE-2016-3485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3485"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3485"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79994?format=api",
            "vulnerability_id": "VCID-1cfu-xjj6-tfcw",
            "summary": "JDK: unspecified vulnerability fixed in 8u311 (Deployment)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70555",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70713",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70626",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70648",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7062",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70673",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70652",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70703",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70569",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70587",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7061",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35560"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027731",
                    "reference_id": "2027731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027731"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2482",
                    "reference_id": "AVG-2482",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2482"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030",
                    "reference_id": "RHSA-2021:5030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5030"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345",
                    "reference_id": "RHSA-2022:0345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0345"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35560"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cfu-xjj6-tfcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43654?format=api",
            "vulnerability_id": "VCID-1d8b-g1b7-33dn",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36957",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36621",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36972",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36741",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36709",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36992",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37043",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37055",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37065",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37031",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37004",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37049",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37032",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2811"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/103810"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569203",
                    "reference_id": "1569203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569203"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2811",
                    "reference_id": "CVE-2018-2811",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2811"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2811"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1d8b-g1b7-33dn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42559?format=api",
            "vulnerability_id": "VCID-1e6n-3kbt-xucw",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91566",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91499",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91505",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91511",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91519",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91543",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91542",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91565",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9156",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91568",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6456"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70522"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152758",
                    "reference_id": "1152758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152758"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6456",
                    "reference_id": "CVE-2014-6456",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6456"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6456"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6n-3kbt-xucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30942?format=api",
            "vulnerability_id": "VCID-2v3q-7u91-syh3",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87452",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87413",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87426",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87417",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87431",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87434",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87428",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87445",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87451",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87363",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87388",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87387",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87406",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3443"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86482"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-376"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328618",
                    "reference_id": "1328618",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328618"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3443",
                    "reference_id": "CVE-2016-3443",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3443"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3443"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42575?format=api",
            "vulnerability_id": "VCID-36hf-zrgy-cqda",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90803",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90747",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90768",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90774",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9078",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90796",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90808",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6513"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61629"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70569",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70569"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2386-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2386-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2388-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2388-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2388-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2388-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150118",
                    "reference_id": "1150118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150118"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6513",
                    "reference_id": "CVE-2014-6513",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6513"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2388-2/",
                    "reference_id": "USN-2388-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2388-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6513"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36hf-zrgy-cqda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83286?format=api",
            "vulnerability_id": "VCID-3jv7-ceaz-87cb",
            "summary": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50488",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50554",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50551",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50593",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50569",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50596",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50601",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50579",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50526",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50533",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50517",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5046",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50544",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50499",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2940"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104768"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146",
                    "reference_id": "1602146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940",
                    "reference_id": "CVE-2018-2940",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2253",
                    "reference_id": "RHSA-2018:2253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2254",
                    "reference_id": "RHSA-2018:2254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2255",
                    "reference_id": "RHSA-2018:2255",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2255"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2256",
                    "reference_id": "RHSA-2018:2256",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2568",
                    "reference_id": "RHSA-2018:2568",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2568"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2569",
                    "reference_id": "RHSA-2018:2569",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2575",
                    "reference_id": "RHSA-2018:2575",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2576",
                    "reference_id": "RHSA-2018:2576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2712",
                    "reference_id": "RHSA-2018:2712",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2712"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2713",
                    "reference_id": "RHSA-2018:2713",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2713"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007",
                    "reference_id": "RHSA-2018:3007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008",
                    "reference_id": "RHSA-2018:3008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3008"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2940"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jv7-ceaz-87cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50869?format=api",
            "vulnerability_id": "VCID-45wy-ban5-qqg8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which can be remotely exploited without\n    authentication.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82884",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82758",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82795",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82801",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82817",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82808",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82847",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82846",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82849",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82871",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8288",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82769",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10309"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43103/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43103/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101328"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503319",
                    "reference_id": "1503319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503319"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py",
                    "reference_id": "CVE-2017-10309",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10309",
                    "reference_id": "CVE-2017-10309",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10309"
                },
                {
                    "reference_url": "http://srcincite.io/advisories/src-2017-0028/",
                    "reference_id": "CVE-2017-10309",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://srcincite.io/advisories/src-2017-0028/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-10309"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45wy-ban5-qqg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81946?format=api",
            "vulnerability_id": "VCID-4fz7-854p-3qa5",
            "summary": "OpenJDK: FilePermission checks not preformed correctly on Windows (Libraries, 8213429)",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66348",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.662",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6624",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66318",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66305",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66273",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66308",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66324",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6631",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66334",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66267",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66237",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66284",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66298",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2933"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10315"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777981",
                    "reference_id": "1777981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777981"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2933",
                    "reference_id": "CVE-2019-2933",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2933"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2933"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fz7-854p-3qa5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60252?format=api",
            "vulnerability_id": "VCID-5y7y-27dr-87g9",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89882",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89868",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89867",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89874",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89883",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8982",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89839",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3512"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97727"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455",
                    "reference_id": "1443455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443455"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512",
                    "reference_id": "CVE-2017-3512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3512"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-3512"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-27dr-87g9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354154?format=api",
            "vulnerability_id": "VCID-6fce-bys3-kkgm",
            "summary": "openjdk: OpenJDK: Update LibPNG (Oracle CPU 2026-04)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460045",
                    "reference_id": "2460045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460045"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2026-22020"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fce-bys3-kkgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42563?format=api",
            "vulnerability_id": "VCID-6gh4-5buw-1ydb",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29888",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30291",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3032",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30368",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30244",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30282",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30239",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30192",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30206",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30187",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30144",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30073",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29958",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6466"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70484"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152762",
                    "reference_id": "1152762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152762"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6466",
                    "reference_id": "CVE-2014-6466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6466"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6466"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gh4-5buw-1ydb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50801?format=api",
            "vulnerability_id": "VCID-6mq4-munv-sffc",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88587",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88502",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8851",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88572",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88568",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88565",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88582",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88588",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88527",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88554",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88558",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704480",
                    "reference_id": "1704480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704480"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1777",
                    "reference_id": "CVE-2019-2697",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1777"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt",
                    "reference_id": "CVE-2019-2697",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03959en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-10",
                    "reference_id": "GLSA-201908-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201908-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1163",
                    "reference_id": "RHSA-2019:1163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1164",
                    "reference_id": "RHSA-2019:1164",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1165",
                    "reference_id": "RHSA-2019:1165",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1166",
                    "reference_id": "RHSA-2019:1166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1238",
                    "reference_id": "RHSA-2019:1238",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1325",
                    "reference_id": "RHSA-2019:1325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1325"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3975-1/",
                    "reference_id": "USN-3975-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3975-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2697"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mq4-munv-sffc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40163?format=api",
            "vulnerability_id": "VCID-6q6b-qa23-dyge",
            "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27035",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.269",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26968",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26973",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26926",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26901",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26865",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26816",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26808",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28691",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0413"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184278",
                    "reference_id": "1184278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184278"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-14",
                    "reference_id": "GLSA-201507-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079",
                    "reference_id": "RHSA-2015:0079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080",
                    "reference_id": "RHSA-2015:0080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0080"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2487-1/",
                    "reference_id": "USN-2487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2487-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0413"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q6b-qa23-dyge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82870?format=api",
            "vulnerability_id": "VCID-73ad-ngrz-6uee",
            "summary": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85169",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85045",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85058",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85118",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85142",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85163",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85172",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85076",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85101",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85108",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85124",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85121",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2449"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190118-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190118-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106597"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601",
                    "reference_id": "1685601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449",
                    "reference_id": "CVE-2019-2449",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0469",
                    "reference_id": "RHSA-2019:0469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0472",
                    "reference_id": "RHSA-2019:0472",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0472"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0640",
                    "reference_id": "RHSA-2019:0640",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1238",
                    "reference_id": "RHSA-2019:1238",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1238"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2449"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73ad-ngrz-6uee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34337?format=api",
            "vulnerability_id": "VCID-7jyy-8x35-wbba",
            "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2432",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46115",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46185",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46206",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46187",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46243",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4624",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46184",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46165",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46173",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4618",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2432"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994980",
                    "reference_id": "1994980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994980"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-05",
                    "reference_id": "GLSA-202209-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-26",
                    "reference_id": "GLSA-202409-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-26"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0002/",
                    "reference_id": "ntap-20210723-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210723-0002/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3293",
                    "reference_id": "RHSA-2021:3293",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3293"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2432"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34725?format=api",
            "vulnerability_id": "VCID-7zbp-hqrr-zfh8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79295",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79302",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79311",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79346",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7937",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79355",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79344",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79372",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79366",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79368",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79401",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79406",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79422",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0484"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211773",
                    "reference_id": "1211773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211773"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0857",
                    "reference_id": "RHSA-2015:0857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0857"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0484"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zbp-hqrr-zfh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/267310?format=api",
            "vulnerability_id": "VCID-8ad6-fezd-efdn",
            "summary": "Vulnerability in Oracle Java SE (component: Install).   The supported version that is affected is Oracle Java SE: 8u451. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE executes to compromise Oracle Java SE.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Java SE. Note: Applies to installation process on client deployment of Java. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50063",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17206",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17256",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18718",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18892",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18782",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19013",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18965",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18914",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1888",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50063"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2025.html",
                    "reference_id": "cpujul2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:16Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2025.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-50063"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ad6-fezd-efdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34733?format=api",
            "vulnerability_id": "VCID-8b8r-rdb7-7bed",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82533",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82547",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82585",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82611",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82605",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82598",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82635",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82639",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8266",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8267",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82676",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2627"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243291",
                    "reference_id": "1243291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243291"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243",
                    "reference_id": "RHSA-2015:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1243"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2627"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8b8r-rdb7-7bed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83285?format=api",
            "vulnerability_id": "VCID-8gea-2k69-cbdk",
            "summary": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36936",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37038",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36971",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36962",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36868",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36899",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48372",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48427",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48477",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48472",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48413",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48425",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2973"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104773"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145",
                    "reference_id": "1602145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973",
                    "reference_id": "CVE-2018-2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2253",
                    "reference_id": "RHSA-2018:2253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2254",
                    "reference_id": "RHSA-2018:2254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2255",
                    "reference_id": "RHSA-2018:2255",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2255"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2256",
                    "reference_id": "RHSA-2018:2256",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2568",
                    "reference_id": "RHSA-2018:2568",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2568"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2569",
                    "reference_id": "RHSA-2018:2569",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2575",
                    "reference_id": "RHSA-2018:2575",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2576",
                    "reference_id": "RHSA-2018:2576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2712",
                    "reference_id": "RHSA-2018:2712",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2712"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2713",
                    "reference_id": "RHSA-2018:2713",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2713"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007",
                    "reference_id": "RHSA-2018:3007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008",
                    "reference_id": "RHSA-2018:3008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3008"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2973"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8gea-2k69-cbdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43642?format=api",
            "vulnerability_id": "VCID-8x6f-shrr-sqaj",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68826",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69273",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69366",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69376",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69356",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69407",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69414",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69303",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69332",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69372",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69355",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69327",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2639"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102556",
                    "reference_id": "102556",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102556"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535351",
                    "reference_id": "1535351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535351"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2639"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8x6f-shrr-sqaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86310?format=api",
            "vulnerability_id": "VCID-9bfs-vsq6-zbd9",
            "summary": "OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20796",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20942",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20717",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20794",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20871",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20776",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20766",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20758",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20745",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20629",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20624",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2059",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3149"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213365",
                    "reference_id": "1213365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213365"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1228",
                    "reference_id": "RHSA-2015:1228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1228"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-3149"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bfs-vsq6-zbd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34755?format=api",
            "vulnerability_id": "VCID-9gpf-rkqa-2fb4",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4902",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91866",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91906",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91925",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91922",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91919",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.18088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.18088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95191",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4902"
                },
                {
                    "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/77241"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273860",
                    "reference_id": "1273860",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273860"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4902",
                    "reference_id": "CVE-2015-4902",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4902"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-4902"
            ],
            "risk_score": 9.6,
            "exploitability": "2.0",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpf-rkqa-2fb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83538?format=api",
            "vulnerability_id": "VCID-9j7e-jeqm-bkat",
            "summary": "JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59231",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59255",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59241",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59235",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59254",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59273",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65637",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65608",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65559",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65655",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65687",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65673",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2783"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103832"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569204",
                    "reference_id": "1569204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569204"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2783",
                    "reference_id": "CVE-2018-2783",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2783"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2783"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9j7e-jeqm-bkat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38594?format=api",
            "vulnerability_id": "VCID-9p9b-qh1v-gkcp",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75866",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76004",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75928",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75951",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75921",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75959",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75961",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75945",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75983",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75993",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75869",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75902",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75914",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5568"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386112",
                    "reference_id": "1386112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386112"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93621",
                    "reference_id": "93621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93621"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-5568"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p9b-qh1v-gkcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42581?format=api",
            "vulnerability_id": "VCID-9yus-96z5-dub9",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91457",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91382",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91387",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91417",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91424",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91432",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91455",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91451",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91462",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91459",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6532"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70507",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70507"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152756",
                    "reference_id": "1152756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152756"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6532",
                    "reference_id": "CVE-2014-6532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6532"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6532"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yus-96z5-dub9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34352?format=api",
            "vulnerability_id": "VCID-arwd-bvw4-gya1",
            "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69243",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69171",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69192",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69177",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69188",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69176",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69226",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69235",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69098",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6912",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69151",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21271"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-05",
                    "reference_id": "GLSA-202209-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-05"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/",
                    "reference_id": "ntap-20220121-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220121-0007/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-21271"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arwd-bvw4-gya1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34730?format=api",
            "vulnerability_id": "VCID-azcs-6ud7-nfab",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83735",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83748",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83765",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83795",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83811",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83805",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83801",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83835",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83861",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83869",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83874",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0492"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211770",
                    "reference_id": "1211770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211770"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0857",
                    "reference_id": "RHSA-2015:0857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0857"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0492"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azcs-6ud7-nfab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34741?format=api",
            "vulnerability_id": "VCID-b4ha-df1e-kkah",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90231",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90234",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90247",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90251",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90274",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90282",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90276",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90302",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90299",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4736"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243284",
                    "reference_id": "1243284",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243284"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-4736"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ha-df1e-kkah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50868?format=api",
            "vulnerability_id": "VCID-b9dc-j8uy-nfdz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which can be remotely exploited without\n    authentication.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6269",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62527",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62632",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62655",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62673",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62682",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62664",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62676",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62692",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62582",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10293"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101338"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503320",
                    "reference_id": "1503320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503320"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10293",
                    "reference_id": "CVE-2017-10293",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10293"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-10293"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b9dc-j8uy-nfdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42561?format=api",
            "vulnerability_id": "VCID-bmb1-ekh1-9fc3",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36258",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36591",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36779",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36666",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36692",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36631",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36659",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36375",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36344",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6458"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61635"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70460"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152763",
                    "reference_id": "1152763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152763"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6458",
                    "reference_id": "CVE-2014-6458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6458"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6458"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bmb1-ekh1-9fc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34330?format=api",
            "vulnerability_id": "VCID-bqav-d2f9-x7d1",
            "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8051",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80484",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80481",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8048",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80452",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80473",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80444",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80425",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80414",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2161"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951231",
                    "reference_id": "1951231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951231"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/",
                    "reference_id": "5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/"
                },
                {
                    "reference_url": "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures",
                    "reference_id": "april-2021.html#fixed-common-vulnerabilities-and-exposures",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1865",
                    "reference_id": "AVG-1865",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1865"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1866",
                    "reference_id": "AVG-1866",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1866"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1867",
                    "reference_id": "AVG-1867",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1867"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/",
                    "reference_id": "CFXOKM2233JVGYDOWW77BN54X3GZTIBK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/",
                    "reference_id": "CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4899",
                    "reference_id": "dsa-4899",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4899"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-05",
                    "reference_id": "GLSA-202209-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-05"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/",
                    "reference_id": "MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/",
                    "reference_id": "MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0001/",
                    "reference_id": "ntap-20210513-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210513-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1445",
                    "reference_id": "RHSA-2021:1445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1447",
                    "reference_id": "RHSA-2021:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1447"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/",
                    "reference_id": "UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2161"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43641?format=api",
            "vulnerability_id": "VCID-c1mn-fexd-p3dk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72567",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73137",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73146",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73174",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73188",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73051",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73083",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00748",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73094",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2638"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102546",
                    "reference_id": "102546",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102546"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535350",
                    "reference_id": "1535350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535350"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2638"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c1mn-fexd-p3dk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30939?format=api",
            "vulnerability_id": "VCID-cmr5-b3n9-6uhu",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88012",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87975",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87988",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88005",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88011",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87918",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87945",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87966",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87973",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87984",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3422"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86488"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328620",
                    "reference_id": "1328620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328620"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3422",
                    "reference_id": "CVE-2016-3422",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3422"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3422"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34734?format=api",
            "vulnerability_id": "VCID-cwm9-b8a3-skdz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86071",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86081",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86097",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86115",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86127",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86141",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8614",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86136",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86153",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86158",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8615",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86171",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86181",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243287",
                    "reference_id": "1243287",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243287"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243",
                    "reference_id": "RHSA-2015:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486",
                    "reference_id": "RHSA-2015:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544",
                    "reference_id": "RHSA-2015:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604",
                    "reference_id": "RHSA-2015:1604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1604"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2637"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwm9-b8a3-skdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83282?format=api",
            "vulnerability_id": "VCID-dab9-tg36-93e3",
            "summary": "JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2964",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63206",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63045",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63182",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6319",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63192",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63207",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63098",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6315",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63167",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2964"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104780"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142",
                    "reference_id": "1602142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602142"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964",
                    "reference_id": "CVE-2018-2964",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2964"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2253",
                    "reference_id": "RHSA-2018:2253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2256",
                    "reference_id": "RHSA-2018:2256",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2256"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2964"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dab9-tg36-93e3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34738?format=api",
            "vulnerability_id": "VCID-dkzr-ncga-w3ex",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36901",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36815",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36839",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36805",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3678",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36827",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3681",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3675",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36527",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36496",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36407",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2664"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243300",
                    "reference_id": "1243300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243300"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243",
                    "reference_id": "RHSA-2015:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486",
                    "reference_id": "RHSA-2015:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544",
                    "reference_id": "RHSA-2015:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604",
                    "reference_id": "RHSA-2015:1604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1604"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2664"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dkzr-ncga-w3ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68625?format=api",
            "vulnerability_id": "VCID-e6dm-6767-9kdk",
            "summary": "openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32136",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32274",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32212",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32185",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32311",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32233",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32589",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32433",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32317",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32669",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32631",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32603",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32619",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50059"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376785",
                    "reference_id": "2376785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376785"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2025.html",
                    "reference_id": "cpujul2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10865",
                    "reference_id": "RHSA-2025:10865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10865"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10866",
                    "reference_id": "RHSA-2025:10866",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10866"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10867",
                    "reference_id": "RHSA-2025:10867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10867"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10868",
                    "reference_id": "RHSA-2025:10868",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10868"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10869",
                    "reference_id": "RHSA-2025:10869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10869"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10870",
                    "reference_id": "RHSA-2025:10870",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10870"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10873",
                    "reference_id": "RHSA-2025:10873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10873"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10874",
                    "reference_id": "RHSA-2025:10874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10874"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10875",
                    "reference_id": "RHSA-2025:10875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10875"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13656",
                    "reference_id": "RHSA-2025:13656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934",
                    "reference_id": "RHSA-2026:0934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0934"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7668-1/",
                    "reference_id": "USN-7668-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7668-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7669-1/",
                    "reference_id": "USN-7669-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7669-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7672-1/",
                    "reference_id": "USN-7672-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7672-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7673-1/",
                    "reference_id": "USN-7673-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7673-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7674-1/",
                    "reference_id": "USN-7674-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7674-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7690-1/",
                    "reference_id": "USN-7690-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7690-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-50059"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31623?format=api",
            "vulnerability_id": "VCID-edzj-4q7d-4bdj",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55543",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65932",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65898",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65948",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65937",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65894",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6586",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65912",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00499",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65927",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10105"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472667",
                    "reference_id": "1472667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472667"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99851",
                    "reference_id": "99851",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99851"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-10105"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edzj-4q7d-4bdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83724?format=api",
            "vulnerability_id": "VCID-eu23-93rk-pkaz",
            "summary": "JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63445",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77077",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77048",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77043",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7705",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77084",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79644",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.796",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79629",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79652",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79673",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2657"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102629",
                    "reference_id": "102629",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102629"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535353",
                    "reference_id": "1535353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535353"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2657"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eu23-93rk-pkaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83281?format=api",
            "vulnerability_id": "VCID-fa7w-w2jp-1kbk",
            "summary": "JDK: unspecified vulnerability fixed in 6u201, 7u191, and 8u181 (Java DB)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2938",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68631",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68786",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68722",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68735",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68774",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6878",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68644",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68713",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68736",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2938"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104774"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602141",
                    "reference_id": "1602141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602141"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2938",
                    "reference_id": "CVE-2018-2938",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2938"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2938"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fa7w-w2jp-1kbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34735?format=api",
            "vulnerability_id": "VCID-fhch-983g-ryf2",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91277",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91287",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91293",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91312",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91319",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91321",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9132",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91345",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91344",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91355",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91353",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2638"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243283",
                    "reference_id": "1243283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243283"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243",
                    "reference_id": "RHSA-2015:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486",
                    "reference_id": "RHSA-2015:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544",
                    "reference_id": "RHSA-2015:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604",
                    "reference_id": "RHSA-2015:1604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1604"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2638"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhch-983g-ryf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81947?format=api",
            "vulnerability_id": "VCID-gmsf-fz6q-xffa",
            "summary": "JDK: unspecified vulnerability fixed in 8u221 (Deployment)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84573",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84441",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84457",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84535",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84537",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84563",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84571",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84476",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84478",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84499",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84505",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84524",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84519",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778942",
                    "reference_id": "1778942",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778942"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2996",
                    "reference_id": "CVE-2019-2996",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2996"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4113",
                    "reference_id": "RHSA-2019:4113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4115",
                    "reference_id": "RHSA-2019:4115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0006",
                    "reference_id": "RHSA-2020:0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0046",
                    "reference_id": "RHSA-2020:0046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0046"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2996"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsf-fz6q-xffa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42558?format=api",
            "vulnerability_id": "VCID-gst6-e8vf-jff8",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4288",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91457",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91459",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91382",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91387",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91417",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91424",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91432",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91455",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91451",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91462",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4288"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70470"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152761",
                    "reference_id": "1152761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152761"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4288",
                    "reference_id": "CVE-2014-4288",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4288"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-4288"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gst6-e8vf-jff8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85602?format=api",
            "vulnerability_id": "VCID-gwf2-u7vy-hqac",
            "summary": "JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Install)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3091",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31038",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31085",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30903",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3099",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30994",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30951",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30906",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30917",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30883",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30722",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30605",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30522",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2597"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243285",
                    "reference_id": "1243285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243285"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2597"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwf2-u7vy-hqac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34726?format=api",
            "vulnerability_id": "VCID-j4nj-26mu-p7a2",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56853",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56948",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56969",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56945",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57007",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56986",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56963",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56992",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56966",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56905",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56923",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56907",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0486"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211774",
                    "reference_id": "1211774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211774"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0486"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4nj-26mu-p7a2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34742?format=api",
            "vulnerability_id": "VCID-j8w9-x9f9-hfec",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24083",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24213",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24034",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24102",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24148",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24123",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24067",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2408",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24051",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23925",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23912",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23871",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4810"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273858",
                    "reference_id": "1273858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273858"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-4810"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8w9-x9f9-hfec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43636?format=api",
            "vulnerability_id": "VCID-jnkf-c6qq-77c2",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64853",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64756",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64812",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64829",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64818",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64789",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64827",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64838",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64825",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64843",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64856",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64785",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2627"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102584",
                    "reference_id": "102584",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102584"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535352",
                    "reference_id": "1535352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535352"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2627"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnkf-c6qq-77c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42576?format=api",
            "vulnerability_id": "VCID-kbur-d5ax-jqgk",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86884",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86782",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86825",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86834",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86847",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86843",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86839",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86856",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8686",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86876",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86883",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6515"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70565"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152766",
                    "reference_id": "1152766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152766"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6515",
                    "reference_id": "CVE-2014-6515",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6515"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6515"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbur-d5ax-jqgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50803?format=api",
            "vulnerability_id": "VCID-kbx9-qaje-37bs",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78023",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78002",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7801",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77883",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77918",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77928",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77932",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77958",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77943",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77942",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77977",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77976",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7797",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2699"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-10",
                    "reference_id": "GLSA-201908-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201908-10"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K02771314",
                    "reference_id": "K02771314",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K02771314"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2699"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbx9-qaje-37bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42570?format=api",
            "vulnerability_id": "VCID-kwca-ph6k-wqar",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92947",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92897",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92908",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92916",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9292",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92925",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92923",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92924",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92934",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92936",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92943",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92945",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6503"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70518"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152757",
                    "reference_id": "1152757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152757"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6503",
                    "reference_id": "CVE-2014-6503",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6503"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6503"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwca-ph6k-wqar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=api",
            "vulnerability_id": "VCID-kzak-fju8-eqew",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64665",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64523",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64576",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6464",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64651",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64637",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64657",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64669",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64605",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64563",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64612",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64628",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64645",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163",
                    "reference_id": "1414163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95570",
                    "reference_id": "95570",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95570"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-3259"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31637?format=api",
            "vulnerability_id": "VCID-msyp-df3m-gqdx",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41889",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41979",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41974",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46575",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46517",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46556",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55203",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55142",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55191",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55183",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55165",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55204",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55207",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55186",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10125"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472664",
                    "reference_id": "1472664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472664"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99809",
                    "reference_id": "99809",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99809"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-10125"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msyp-df3m-gqdx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50860?format=api",
            "vulnerability_id": "VCID-my4w-m69q-gfak",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86603",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86505",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86515",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86534",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86552",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86562",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86573",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8658",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86578",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86596",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86604",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0603"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2016/Feb/54",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2016/Feb/54"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160217-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20160217-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/537462/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/537462/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/83008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/83008"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034969"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0603",
                    "reference_id": "CVE-2016-0603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0603"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-0603"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my4w-m69q-gfak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48513?format=api",
            "vulnerability_id": "VCID-n3s6-1ba7-47g7",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87085",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8975",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.898",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89798",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89791",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89801",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89815",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89816",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89753",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89767",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89793",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5556"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386408",
                    "reference_id": "1386408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386408"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93618",
                    "reference_id": "93618",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93618"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136",
                    "reference_id": "RHSA-2016:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2136"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html",
                    "reference_id": "RHSA-2016-2136.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137",
                    "reference_id": "RHSA-2016:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2137"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html",
                    "reference_id": "RHSA-2016-2137.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138",
                    "reference_id": "RHSA-2016:2138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2138"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html",
                    "reference_id": "RHSA-2016-2138.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659",
                    "reference_id": "RHSA-2016:2659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2659"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html",
                    "reference_id": "RHSA-2016-2659.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-5556"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3s6-1ba7-47g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50863?format=api",
            "vulnerability_id": "VCID-n6gk-phrw-cbbw",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25132",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.253",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25357",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25315",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25262",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25271",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25189",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25178",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2535",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2542",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25455",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2523",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3503"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91996"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169",
                    "reference_id": "1358169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503",
                    "reference_id": "CVE-2016-3503",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3503"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gk-phrw-cbbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43659?format=api",
            "vulnerability_id": "VCID-nnks-uqvq-dubg",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67179",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67045",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6715",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67145",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67167",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6713",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2426"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190118-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190118-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106590"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665953",
                    "reference_id": "1665953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665953"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2426",
                    "reference_id": "CVE-2019-2426",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2426"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2426"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnks-uqvq-dubg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71990?format=api",
            "vulnerability_id": "VCID-ntga-y6cv-a3df",
            "summary": "openjdk: Enhance array handling (Oracle CPU 2025-01)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41858",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42008",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41948",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42092",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42094",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42116",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42079",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42054",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42078",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21502"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338992",
                    "reference_id": "2338992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338992"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2025.html",
                    "reference_id": "cpujan2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0421",
                    "reference_id": "RHSA-2025:0421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0421"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0422",
                    "reference_id": "RHSA-2025:0422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0422"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0423",
                    "reference_id": "RHSA-2025:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0424",
                    "reference_id": "RHSA-2025:0424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0425",
                    "reference_id": "RHSA-2025:0425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0425"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0426",
                    "reference_id": "RHSA-2025:0426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0426"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0427",
                    "reference_id": "RHSA-2025:0427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0427"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0428",
                    "reference_id": "RHSA-2025:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0429",
                    "reference_id": "RHSA-2025:0429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0429"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1154",
                    "reference_id": "RHSA-2025:1154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1154"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:2615",
                    "reference_id": "RHSA-2025:2615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:2615"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7252-1/",
                    "reference_id": "USN-7252-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7252-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7253-1/",
                    "reference_id": "USN-7253-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7253-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7254-1/",
                    "reference_id": "USN-7254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7254-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7255-1/",
                    "reference_id": "USN-7255-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7255-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7338-1/",
                    "reference_id": "USN-7338-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7338-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7339-1/",
                    "reference_id": "USN-7339-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7339-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-21502"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40146?format=api",
            "vulnerability_id": "VCID-ntmk-ub1c-5ygz",
            "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30654",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31531",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31358",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31232",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32367",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32397",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32309",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32333",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32369",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32346",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3236",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32496",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32319",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0403"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184275",
                    "reference_id": "1184275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184275"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-14",
                    "reference_id": "GLSA-201507-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079",
                    "reference_id": "RHSA-2015:0079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080",
                    "reference_id": "RHSA-2015:0080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086",
                    "reference_id": "RHSA-2015:0086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133",
                    "reference_id": "RHSA-2015:0133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134",
                    "reference_id": "RHSA-2015:0134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135",
                    "reference_id": "RHSA-2015:0135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0135"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263",
                    "reference_id": "RHSA-2015:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0403"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ntmk-ub1c-5ygz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50865?format=api",
            "vulnerability_id": "VCID-pynq-sbec-akf8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17942",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18004",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18021",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1788",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17825",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17802",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18103",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17943",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92000"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167",
                    "reference_id": "1358167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552",
                    "reference_id": "CVE-2016-3552",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3552"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pynq-sbec-akf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81945?format=api",
            "vulnerability_id": "VCID-qc7k-5py9-y7ab",
            "summary": "OpenJDK: Incorrect escaping of command line arguments in ProcessImpl on Windows (Libraries, 8221858)",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2958",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78842",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78718",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78726",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78798",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78791",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78819",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78825",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78739",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78765",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78772",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78796",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2958"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777929",
                    "reference_id": "1777929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777929"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2958",
                    "reference_id": "CVE-2019-2958",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2958"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2958"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qc7k-5py9-y7ab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=api",
            "vulnerability_id": "VCID-qp1y-5scd-c7hy",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2311",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23414",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23323",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2334",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23334",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23316",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23124",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23117",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23277",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23451",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23345",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91990"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168",
                    "reference_id": "1358168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511",
                    "reference_id": "CVE-2016-3511",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587",
                    "reference_id": "RHSA-2016:1587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588",
                    "reference_id": "RHSA-2016:1588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589",
                    "reference_id": "RHSA-2016:1589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3511"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42565?format=api",
            "vulnerability_id": "VCID-qr8w-umju-9yfd",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89268",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89186",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89208",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89226",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8924",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89237",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89246",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89259",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89264",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6476"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70531"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152765",
                    "reference_id": "1152765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152765"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6476",
                    "reference_id": "CVE-2014-6476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6476"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6476"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8w-umju-9yfd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30943?format=api",
            "vulnerability_id": "VCID-qs56-bnkb-buhu",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88523",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88575",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88587",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88593",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8859",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88603",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88609",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8857",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3449"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86485"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328619",
                    "reference_id": "1328619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328619"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3449",
                    "reference_id": "CVE-2016-3449",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3449"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-3449"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83284?format=api",
            "vulnerability_id": "VCID-qtnv-wwec-gufw",
            "summary": "JDK: unspecified vulnerability fixed in 7u191 and 8u181 (Windows DLL)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69546",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6971",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69628",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69614",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69654",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69662",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69644",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69696",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69705",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69553",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69604",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69621",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69643",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104781"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602144",
                    "reference_id": "1602144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602144"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2942",
                    "reference_id": "CVE-2018-2942",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2942"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2942"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtnv-wwec-gufw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60253?format=api",
            "vulnerability_id": "VCID-rudc-b743-5uh8",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78856",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7898",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78904",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78928",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78912",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78902",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78931",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78927",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78957",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78863",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78873",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78898",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3514"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97729"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469",
                    "reference_id": "1443469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443469"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514",
                    "reference_id": "CVE-2017-3514",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3514"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-3514"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rudc-b743-5uh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34729?format=api",
            "vulnerability_id": "VCID-rzqe-8qgr-7fet",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91963",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91985",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91998",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92001",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92005",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92013",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92017",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92012",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0491"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211769",
                    "reference_id": "1211769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211769"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0857",
                    "reference_id": "RHSA-2015:0857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0858",
                    "reference_id": "RHSA-2015:0858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0858"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1006",
                    "reference_id": "RHSA-2015:1006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1007",
                    "reference_id": "RHSA-2015:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1020",
                    "reference_id": "RHSA-2015:1020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1021",
                    "reference_id": "RHSA-2015:1021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1091",
                    "reference_id": "RHSA-2015:1091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1091"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0491"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqe-8qgr-7fet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34715?format=api",
            "vulnerability_id": "VCID-ubqp-f2qp-5qcn",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91738",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91743",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91751",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91763",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9177",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91773",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91775",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91791",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91784",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91785",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91788",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0458"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211771",
                    "reference_id": "1211771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211771"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0857",
                    "reference_id": "RHSA-2015:0857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0858",
                    "reference_id": "RHSA-2015:0858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0858"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1006",
                    "reference_id": "RHSA-2015:1006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1007",
                    "reference_id": "RHSA-2015:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1020",
                    "reference_id": "RHSA-2015:1020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1091",
                    "reference_id": "RHSA-2015:1091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1091"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0458"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubqp-f2qp-5qcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42579?format=api",
            "vulnerability_id": "VCID-ue2f-emuu-43af",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85829",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85704",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85771",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85786",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85779",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85797",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85802",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85819",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02656",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85828",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6527"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61346"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70560"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2388-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2388-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2388-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2388-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152767",
                    "reference_id": "1152767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152767"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6527",
                    "reference_id": "CVE-2014-6527",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6527"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2388-1/",
                    "reference_id": "USN-2388-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2388-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6527"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ue2f-emuu-43af"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42567?format=api",
            "vulnerability_id": "VCID-uhsa-uttv-mfes",
            "summary": "Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82485",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82336",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82369",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82364",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82415",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82444",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82446",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82472",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82482",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6492"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61163"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61164"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61609"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201502-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70456"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152759",
                    "reference_id": "1152759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152759"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6492",
                    "reference_id": "CVE-2014-6492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6492"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201502-12",
                    "reference_id": "GLSA-201502-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201502-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1657",
                    "reference_id": "RHSA-2014:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1658",
                    "reference_id": "RHSA-2014:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876",
                    "reference_id": "RHSA-2014:1876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877",
                    "reference_id": "RHSA-2014:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880",
                    "reference_id": "RHSA-2014:1880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882",
                    "reference_id": "RHSA-2014:1882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1882"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6492"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhsa-uttv-mfes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/27185?format=api",
            "vulnerability_id": "VCID-umzv-dbgt-c7hu",
            "summary": "Sparkle Signing Checks Bypass\nA security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21569",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21818",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21947",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21713",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2179",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21579",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21585",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21732",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21767",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21893",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2176",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0509"
                },
                {
                    "reference_url": "https://github.com/sparkle-project/Sparkle",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparkle-project/Sparkle"
                },
                {
                    "reference_url": "https://github.com/sparkle-project/Sparkle/pull/2550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/"
                        }
                    ],
                    "url": "https://github.com/sparkle-project/Sparkle/pull/2550"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0509"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20250124-0008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20250124-0008"
                },
                {
                    "reference_url": "https://sparkle-project.org/documentation/security-and-reliability",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://sparkle-project.org/documentation/security-and-reliability"
                },
                {
                    "reference_url": "https://sparkle-project.org/documentation/security-and-reliability/",
                    "reference_id": "security-and-reliability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/"
                        }
                    ],
                    "url": "https://sparkle-project.org/documentation/security-and-reliability/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-0509",
                "GHSA-wc9m-r3v6-9p5h"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umzv-dbgt-c7hu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37013?format=api",
            "vulnerability_id": "VCID-upgw-aw1e-m7g6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68307",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68162",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68274",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68254",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68296",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68304",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68185",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6818",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68246",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68258",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8328"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414164",
                    "reference_id": "1414164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414164"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95581",
                    "reference_id": "95581",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95581"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-8328"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upgw-aw1e-m7g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34716?format=api",
            "vulnerability_id": "VCID-w2ja-cauk-8ke2",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93038",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93047",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93051",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9305",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93058",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93063",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93068",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93066",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93067",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93078",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93083",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93088",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93094",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9309",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0459"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211768",
                    "reference_id": "1211768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211768"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0854",
                    "reference_id": "RHSA-2015:0854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0857",
                    "reference_id": "RHSA-2015:0857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0858",
                    "reference_id": "RHSA-2015:0858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0858"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1006",
                    "reference_id": "RHSA-2015:1006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1007",
                    "reference_id": "RHSA-2015:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1020",
                    "reference_id": "RHSA-2015:1020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1021",
                    "reference_id": "RHSA-2015:1021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1091",
                    "reference_id": "RHSA-2015:1091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1091"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0459"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ja-cauk-8ke2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40147?format=api",
            "vulnerability_id": "VCID-xry5-hzk4-b3b8",
            "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90502",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90535",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90541",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9055",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90543",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90561",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9056",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90559",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90574",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9164",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0406"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184277",
                    "reference_id": "1184277",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184277"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-14",
                    "reference_id": "GLSA-201507-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079",
                    "reference_id": "RHSA-2015:0079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080",
                    "reference_id": "RHSA-2015:0080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086",
                    "reference_id": "RHSA-2015:0086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133",
                    "reference_id": "RHSA-2015:0133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134",
                    "reference_id": "RHSA-2015:0134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135",
                    "reference_id": "RHSA-2015:0135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0135"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263",
                    "reference_id": "RHSA-2015:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264",
                    "reference_id": "RHSA-2015:0264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0264"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0406"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xry5-hzk4-b3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37029?format=api",
            "vulnerability_id": "VCID-xwtx-qzfe-duac",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71261",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71117",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71166",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71212",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71196",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7125",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71258",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71119",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71173",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71197",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71183",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3262"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414162",
                    "reference_id": "1414162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414162"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95578",
                    "reference_id": "95578",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95578"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-3262"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtx-qzfe-duac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82364?format=api",
            "vulnerability_id": "VCID-xx59-6jd1-wbdr",
            "summary": "OpenJDK: Insufficient permission checks for file:// URLs on Windows (Networking, 8213431)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77229",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77207",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77214",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78769",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7874",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81964",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81991",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82018",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82006",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81934",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81968",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2766"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730459",
                    "reference_id": "1730459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730459"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "cpujul2019-5072835.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10300",
                    "reference_id": "index?page=content&id=SB10300",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10300"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-2766"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx59-6jd1-wbdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34740?format=api",
            "vulnerability_id": "VCID-y1a8-8hmg-w3e3",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85532",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85544",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85567",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85608",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85604",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85627",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85632",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85629",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8565",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85661",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85663",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4729"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243290",
                    "reference_id": "1243290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243290"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-4729"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1a8-8hmg-w3e3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34732?format=api",
            "vulnerability_id": "VCID-yw9c-x1mv-3beb",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84488",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84504",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84528",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84555",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84574",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84569",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84586",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84613",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84621",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84623",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2619"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243286",
                    "reference_id": "1243286",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243286"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-2619"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yw9c-x1mv-3beb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50797?format=api",
            "vulnerability_id": "VCID-z5kk-krqv-37aa",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40207",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40495",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40486",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40409",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40299",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40288",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40443",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40494",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40505",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40526",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40489",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3211"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105591",
                    "reference_id": "105591",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/105591"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639906",
                    "reference_id": "1639906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639906"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-10",
                    "reference_id": "GLSA-201908-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201908-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002",
                    "reference_id": "RHSA-2018:3002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3002"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003",
                    "reference_id": "RHSA-2018:3003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3003"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-3211"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z5kk-krqv-37aa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31276?format=api",
            "vulnerability_id": "VCID-ztyf-ukmt-63b3",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81234",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81243",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81266",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81265",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81293",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81298",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81319",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81305",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81297",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81334",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81336",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81359",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81366",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81372",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0400"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183039",
                    "reference_id": "1183039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183039"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-14",
                    "reference_id": "GLSA-201507-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2486-1/",
                    "reference_id": "USN-2486-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2486-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2487-1/",
                    "reference_id": "USN-2487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2487-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api",
                    "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2015-0400"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyf-ukmt-63b3"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"
}