{"url":"http://public2.vulnerablecode.io/api/packages/1037460?format=json","purl":"pkg:deb/debian/openjfx@8u102-b14-1~bpo8%2B1","type":"deb","namespace":"debian","name":"openjfx","version":"8u102-b14-1~bpo8+1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"11.0.2+1-1","latest_non_vulnerable_version":"11.0.2+1-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50862?format=json","vulnerability_id":"VCID-26wp-rmjk-huc8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3498","reference_id":"","reference_type":"","scores":[{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91179","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91973","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91994","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92003","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92011","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91955","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91956","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securityfocus.com/bid/91956"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358170","reference_id":"1358170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358170"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419","reference_id":"832419","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3498","reference_id":"CVE-2016-3498","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3498"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037461?format=json","purl":"pkg:deb/debian/openjfx@8u111-b14-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2znn-4qpa-6kbm"},{"vulnerability":"VCID-4m47-kkyx-dyet"},{"vulnerability":"VCID-5bfn-1ajw-cqdr"},{"vulnerability":"VCID-a91k-9kv3-yfb9"},{"vulnerability":"VCID-jvtu-gg6n-hyce"},{"vulnerability":"VCID-jw3n-w9gu-x3hg"},{"vulnerability":"VCID-ts2n-qwjz-nfec"},{"vulnerability":"VCID-yptm-3aag-fqbj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u111-b14-1"}],"aliases":["CVE-2016-3498"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26wp-rmjk-huc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34415?format=json","vulnerability_id":"VCID-2znn-4qpa-6kbm","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14664","reference_id":"","reference_type":"","scores":[{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.7778","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77816","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77866","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77855","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77873","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77753","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866027","reference_id":"1866027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866027"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-20-897/","reference_id":"ZDI-20-897","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-897/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2020-14664"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2znn-4qpa-6kbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31616?format=json","vulnerability_id":"VCID-4m47-kkyx-dyet","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10086","reference_id":"","reference_type":"","scores":[{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69413","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6934","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69374","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69367","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78263","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038931","reference_id":"1038931","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"http://www.securitytracker.com/id/1038931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472657","reference_id":"1472657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472657"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860","reference_id":"870860","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860"},{"reference_url":"http://www.securityfocus.com/bid/99662","reference_id":"99662","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"http://www.securityfocus.com/bid/99662"},{"reference_url":"http://www.debian.org/security/2017/dsa-4005","reference_id":"dsa-4005","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"http://www.debian.org/security/2017/dsa-4005"},{"reference_url":"https://security.gentoo.org/glsa/201709-22","reference_id":"GLSA-201709-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"https://security.gentoo.org/glsa/201709-22"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170720-0001/","reference_id":"ntap-20170720-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170720-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1790","reference_id":"RHSA-2017:1790","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1791","reference_id":"RHSA-2017:1791","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1791"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037462?format=json","purl":"pkg:deb/debian/openjfx@8u141-b14-3~deb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2znn-4qpa-6kbm"},{"vulnerability":"VCID-5bfn-1ajw-cqdr"},{"vulnerability":"VCID-a91k-9kv3-yfb9"},{"vulnerability":"VCID-jvtu-gg6n-hyce"},{"vulnerability":"VCID-jw3n-w9gu-x3hg"},{"vulnerability":"VCID-yptm-3aag-fqbj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1"}],"aliases":["CVE-2017-10086"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4m47-kkyx-dyet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43628?format=json","vulnerability_id":"VCID-5bfn-1ajw-cqdr","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2581","reference_id":"","reference_type":"","scores":[{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65563","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65705","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.6573","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65774","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65745","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65641","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65696","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.6568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69139","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581"},{"reference_url":"http://www.securityfocus.com/bid/102636","reference_id":"102636","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"http://www.securityfocus.com/bid/102636"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535354","reference_id":"1535354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535354"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530","reference_id":"888530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2018-2581"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5bfn-1ajw-cqdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78278?format=json","vulnerability_id":"VCID-a91k-9kv3-yfb9","summary":"JavaFX: unauthorized creation, deletion or modification access to critical data via multiple protocols","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22043","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48073","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48138","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48162","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48107","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48136","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48199","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5011","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224658","reference_id":"2224658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224658"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230725-0006/","reference_id":"ntap-20230725-0006","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230725-0006/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2023-22043"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a91k-9kv3-yfb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83283?format=json","vulnerability_id":"VCID-jvtu-gg6n-hyce","summary":"JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2941","reference_id":"","reference_type":"","scores":[{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79732","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79613","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79645","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79667","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79684","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.7968","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79693","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.7951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79546","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79607","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104775","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.securityfocus.com/bid/104775"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602143","reference_id":"1602143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215","reference_id":"905215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2941","reference_id":"CVE-2018-2941","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2253","reference_id":"RHSA-2018:2253","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2254","reference_id":"RHSA-2018:2254","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2255","reference_id":"RHSA-2018:2255","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2256","reference_id":"RHSA-2018:2256","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2256"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2018-2941"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtu-gg6n-hyce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50796?format=json","vulnerability_id":"VCID-jw3n-w9gu-x3hg","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3209","reference_id":"","reference_type":"","scores":[{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79454","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79356","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79376","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79395","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79396","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79286","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.7932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79326","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/105590","reference_id":"105590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"http://www.securityfocus.com/bid/105590"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639904","reference_id":"1639904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639904"},{"reference_url":"https://security.gentoo.org/glsa/201908-10","reference_id":"GLSA-201908-10","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://security.gentoo.org/glsa/201908-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3002","reference_id":"RHSA-2018:3002","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3003","reference_id":"RHSA-2018:3003","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2018-3209"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw3n-w9gu-x3hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31630?format=json","vulnerability_id":"VCID-ts2n-qwjz-nfec","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10114","reference_id":"","reference_type":"","scores":[{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76208","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76156","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76144","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76159","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038931","reference_id":"1038931","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"http://www.securitytracker.com/id/1038931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472662","reference_id":"1472662","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472662"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860","reference_id":"870860","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860"},{"reference_url":"http://www.securityfocus.com/bid/99726","reference_id":"99726","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"http://www.securityfocus.com/bid/99726"},{"reference_url":"http://www.debian.org/security/2017/dsa-4005","reference_id":"dsa-4005","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"http://www.debian.org/security/2017/dsa-4005"},{"reference_url":"https://security.gentoo.org/glsa/201709-22","reference_id":"GLSA-201709-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"https://security.gentoo.org/glsa/201709-22"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170720-0001/","reference_id":"ntap-20170720-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170720-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1790","reference_id":"RHSA-2017:1790","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1791","reference_id":"RHSA-2017:1791","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1791"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037462?format=json","purl":"pkg:deb/debian/openjfx@8u141-b14-3~deb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2znn-4qpa-6kbm"},{"vulnerability":"VCID-5bfn-1ajw-cqdr"},{"vulnerability":"VCID-a91k-9kv3-yfb9"},{"vulnerability":"VCID-jvtu-gg6n-hyce"},{"vulnerability":"VCID-jw3n-w9gu-x3hg"},{"vulnerability":"VCID-yptm-3aag-fqbj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1"}],"aliases":["CVE-2017-10114"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ts2n-qwjz-nfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45881?format=json","vulnerability_id":"VCID-yptm-3aag-fqbj","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2585","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79014","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79021","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79037","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79073","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7909","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79087","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79103","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0163","scoring_system":"epss","scoring_elements":"0.8208","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807936","reference_id":"1807936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807936"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050271?format=json","purl":"pkg:deb/debian/openjfx@11.0.2%2B1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"}],"aliases":["CVE-2020-2585"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yptm-3aag-fqbj"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u102-b14-1~bpo8%252B1"}