{"url":"http://public2.vulnerablecode.io/api/packages/113170?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1?arch=el6_8","type":"rpm","namespace":"redhat","name":"java-1.7.1-ibm","version":"1:1.7.1.4.1-1jpp.1","qualifiers":{"arch":"el6_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38597?format=json","vulnerability_id":"VCID-1pew-7np4-vqfu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597","reference_id":"","reference_type":"","scores":[{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82762","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84289","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84264","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84305","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84306","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84322","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103","reference_id":"1386103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103"},{"reference_url":"http://www.securityfocus.com/bid/93636","reference_id":"93636","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securityfocus.com/bid/93636"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[],"aliases":["CVE-2016-5597"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=json","vulnerability_id":"VCID-2krr-m59b-77a7","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598","reference_id":"","reference_type":"","scores":[{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9159","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91582","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91572","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91574","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91564","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91918","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91918"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971","reference_id":"1356971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598","reference_id":"CVE-2016-3598","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"}],"fixed_packages":[],"aliases":["CVE-2016-3598"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30942?format=json","vulnerability_id":"VCID-2v3q-7u91-syh3","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443","reference_id":"","reference_type":"","scores":[{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86712","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86667","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86636","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86482","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securityfocus.com/bid/86482"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618","reference_id":"1328618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443","reference_id":"CVE-2016-3443","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3443"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85230?format=json","vulnerability_id":"VCID-46bb-rmw3-47c5","summary":"JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0376","reference_id":"","reference_type":"","scores":[{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81529","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81586","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81511","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81533","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83323","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83426","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.8346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83386","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0376"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/43","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/43"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf"},{"reference_url":"http://www.securityfocus.com/archive/1/538066/100/100/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/538066/100/100/threaded"},{"reference_url":"http://www.securityfocus.com/bid/89192","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89192"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330986","reference_id":"1330986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330986"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0376","reference_id":"CVE-2016-0376","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0376"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46bb-rmw3-47c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85199?format=json","vulnerability_id":"VCID-4ptw-ap8n-bkf2","summary":"JDK: buffer overflow vulnerability in the IBM JVM","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264","reference_id":"","reference_type":"","scores":[{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94128","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.9414","published_at":"2026-05-14T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94095","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94123","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359","reference_id":"1331359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264","reference_id":"CVE-2016-0264","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0264"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ptw-ap8n-bkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=json","vulnerability_id":"VCID-6383-1rzy-9kcr","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3252","reference_id":"","reference_type":"","scores":[{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59675","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59562","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.5962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59577","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59436","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59582","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59571","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413906","reference_id":"1413906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413906"},{"reference_url":"http://www.securityfocus.com/bid/95509","reference_id":"95509","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.securityfocus.com/bid/95509"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3252"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85268?format=json","vulnerability_id":"VCID-6t46-7fea-dyav","summary":"JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363","reference_id":"","reference_type":"","scores":[{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67997","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67906","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71691","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/20","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/20"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/3","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/3"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf"},{"reference_url":"http://www.securityfocus.com/bid/85895","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85895"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044","reference_id":"1324044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363","reference_id":"CVE-2016-0363","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0363"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t46-7fea-dyav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=json","vulnerability_id":"VCID-6xgm-xhae-3bbv","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5549","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67288","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67189","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67201","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67225","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67149","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67145","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413923","reference_id":"1413923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413923"},{"reference_url":"http://www.securityfocus.com/bid/95530","reference_id":"95530","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.securityfocus.com/bid/95530"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5549"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=json","vulnerability_id":"VCID-7ez7-vdry-wbep","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3289","reference_id":"","reference_type":"","scores":[{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78469","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78403","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78414","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7831","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413562","reference_id":"1413562","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413562"},{"reference_url":"http://www.securityfocus.com/bid/95525","reference_id":"95525","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.securityfocus.com/bid/95525"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3289"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30937?format=json","vulnerability_id":"VCID-8edn-xjyj-9fgf","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0687","reference_id":"","reference_type":"","scores":[{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.90004","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86459","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.securityfocus.com/bid/86459"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327749","reference_id":"1327749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327749"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0687","reference_id":"CVE-2016-0687","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0687"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-0687"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8edn-xjyj-9fgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=json","vulnerability_id":"VCID-ar8p-z4ww-wuau","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3241","reference_id":"","reference_type":"","scores":[{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98975","published_at":"2026-05-14T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98962","published_at":"2026-04-26T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98968","published_at":"2026-05-05T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98971","published_at":"2026-05-09T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98972","published_at":"2026-05-11T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98973","published_at":"2026-05-12T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98945","published_at":"2026-04-04T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.9895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98953","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413955","reference_id":"1413955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413955"},{"reference_url":"https://www.exploit-db.com/exploits/41145/","reference_id":"41145","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://www.exploit-db.com/exploits/41145/"},{"reference_url":"http://www.securityfocus.com/bid/95488","reference_id":"95488","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.securityfocus.com/bid/95488"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py","reference_id":"CVE-2017-3241","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/","reference_id":"erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3241"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38592?format=json","vulnerability_id":"VCID-b15r-cqd5-rugd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02542","scoring_system":"epss","scoring_elements":"0.85625","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86857","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86875","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714","reference_id":"1385714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714"},{"reference_url":"http://www.securityfocus.com/bid/93637","reference_id":"93637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securityfocus.com/bid/93637"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[],"aliases":["CVE-2016-5554"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=json","vulnerability_id":"VCID-c7sa-v6cu-d3ex","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5547","reference_id":"","reference_type":"","scores":[{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79568","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79502","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7936","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79411","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79408","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79412","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413764","reference_id":"1413764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413764"},{"reference_url":"http://www.securityfocus.com/bid/95521","reference_id":"95521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.securityfocus.com/bid/95521"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5547"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30939?format=json","vulnerability_id":"VCID-cmr5-b3n9-6uhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422","reference_id":"","reference_type":"","scores":[{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86228","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.8747","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.8799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88005","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86488","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securityfocus.com/bid/86488"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620","reference_id":"1328620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422","reference_id":"CVE-2016-3422","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=json","vulnerability_id":"VCID-e2zb-3859-qfe6","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5546","reference_id":"","reference_type":"","scores":[{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78772","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78682","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78717","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78733","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78609","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413911","reference_id":"1413911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413911"},{"reference_url":"http://www.securityfocus.com/bid/95506","reference_id":"95506","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.securityfocus.com/bid/95506"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5546"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=json","vulnerability_id":"VCID-ftnn-eurn-wydw","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3261","reference_id":"","reference_type":"","scores":[{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75052","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75093","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75117","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75098","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75107","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74991","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75024","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413653","reference_id":"1413653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413653"},{"reference_url":"http://www.securityfocus.com/bid/95566","reference_id":"95566","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.securityfocus.com/bid/95566"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3261"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30941?format=json","vulnerability_id":"VCID-jccp-8k75-xkhn","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3427","reference_id":"","reference_type":"","scores":[{"value":"0.93494","scoring_system":"epss","scoring_elements":"0.99829","published_at":"2026-05-14T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99878","published_at":"2026-05-12T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99877","published_at":"2026-05-07T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99898","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10159","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10159"},{"reference_url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/08/31/1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2020/08/31/1"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86421","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securityfocus.com/bid/86421"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.securitytracker.com/id/1037331","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securitytracker.com/id/1037331"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328210","reference_id":"1328210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328210"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3427","reference_id":"CVE-2016-3427","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3427"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-3427"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jccp-8k75-xkhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=json","vulnerability_id":"VCID-k3pa-xdxn-ubbg","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3231","reference_id":"","reference_type":"","scores":[{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69444","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69405","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69373","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69227","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69284","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413717","reference_id":"1413717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413717"},{"reference_url":"http://www.securityfocus.com/bid/95563","reference_id":"95563","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.securityfocus.com/bid/95563"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3231"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=json","vulnerability_id":"VCID-kzak-fju8-eqew","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259","reference_id":"","reference_type":"","scores":[{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64785","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64644","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64736","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64729","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64669","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163","reference_id":"1414163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163"},{"reference_url":"http://www.securityfocus.com/bid/95570","reference_id":"95570","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securityfocus.com/bid/95570"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2017-3259"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38595?format=json","vulnerability_id":"VCID-n1wv-bkbb-gugt","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573","reference_id":"","reference_type":"","scores":[{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0572","scoring_system":"epss","scoring_elements":"0.90513","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91498","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91499","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544","reference_id":"1385544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544"},{"reference_url":"http://www.securityfocus.com/bid/93628","reference_id":"93628","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securityfocus.com/bid/93628"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[],"aliases":["CVE-2016-5573"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48513?format=json","vulnerability_id":"VCID-n3s6-1ba7-47g7","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5556","reference_id":"","reference_type":"","scores":[{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.8718","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87104","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.8712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87137","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87147","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.8975","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89816","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5556"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386408","reference_id":"1386408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386408"},{"reference_url":"http://www.securityfocus.com/bid/93618","reference_id":"93618","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://www.securityfocus.com/bid/93618"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-5556"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n3s6-1ba7-47g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=json","vulnerability_id":"VCID-qp1y-5scd-c7hy","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23216","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23137","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91990","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91990"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168","reference_id":"1358168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511","reference_id":"CVE-2016-3511","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3511"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=json","vulnerability_id":"VCID-qs1s-6yjm-jye5","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5552","reference_id":"","reference_type":"","scores":[{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72215","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.71993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7214","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72166","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72129","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72157","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.71996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72035","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72079","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"http://www.securitytracker.com/id/1037798","reference_id":"1037798","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securitytracker.com/id/1037798"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413882","reference_id":"1413882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413882"},{"reference_url":"https://source.android.com/security/bulletin/2017-02-01.html","reference_id":"2017-02-01.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://source.android.com/security/bulletin/2017-02-01.html"},{"reference_url":"http://www.securityfocus.com/bid/95512","reference_id":"95512","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securityfocus.com/bid/95512"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5552"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30943?format=json","vulnerability_id":"VCID-qs56-bnkb-buhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449","reference_id":"","reference_type":"","scores":[{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88418","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88377","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.8839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88603","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86485","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securityfocus.com/bid/86485"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619","reference_id":"1328619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449","reference_id":"CVE-2016-3449","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3449"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30936?format=json","vulnerability_id":"VCID-r7cu-ewk5-pygd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0686","reference_id":"","reference_type":"","scores":[{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.90004","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86473","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.securityfocus.com/bid/86473"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327743","reference_id":"1327743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327743"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0686","reference_id":"CVE-2016-0686","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0686"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-0686"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7cu-ewk5-pygd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=json","vulnerability_id":"VCID-snqh-ebq3-hubn","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5548","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67288","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67145","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67189","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67201","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67225","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67149","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67164","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413920","reference_id":"1413920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413920"},{"reference_url":"http://www.securityfocus.com/bid/95559","reference_id":"95559","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.securityfocus.com/bid/95559"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5548"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=json","vulnerability_id":"VCID-taqg-ukr5-ybbk","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426","reference_id":"","reference_type":"","scores":[{"value":"0.01187","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80888","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81635","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86449","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securityfocus.com/bid/86449"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059","reference_id":"1328059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426","reference_id":"CVE-2016-3426","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"}],"fixed_packages":[],"aliases":["CVE-2016-3426"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=json","vulnerability_id":"VCID-tc8v-xrjj-hucq","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3272","reference_id":"","reference_type":"","scores":[{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78469","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78403","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78414","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7831","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:M/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413554","reference_id":"1413554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413554"},{"reference_url":"http://www.securityfocus.com/bid/95533","reference_id":"95533","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.securityfocus.com/bid/95533"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3272"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38589?format=json","vulnerability_id":"VCID-u3rj-qyrr-vkbw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02542","scoring_system":"epss","scoring_elements":"0.85625","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86857","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86875","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723","reference_id":"1385723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723"},{"reference_url":"http://www.securityfocus.com/bid/93643","reference_id":"93643","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securityfocus.com/bid/93643"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[],"aliases":["CVE-2016-5542"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=json","vulnerability_id":"VCID-v64t-4c46-3bhj","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3253","reference_id":"","reference_type":"","scores":[{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.83084","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82972","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82992","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.83033","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.83032","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.83047","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.8286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82937","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413583","reference_id":"1413583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413583"},{"reference_url":"http://www.securityfocus.com/bid/95498","reference_id":"95498","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.securityfocus.com/bid/95498"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3253"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=json","vulnerability_id":"VCID-x54g-mhs4-mug4","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2183","reference_id":"","reference_type":"","scores":[{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97252","published_at":"2026-05-14T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97224","published_at":"2026-05-05T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97229","published_at":"2026-05-07T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97233","published_at":"2026-05-09T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97239","published_at":"2026-05-11T12:55:00Z"},{"value":"0.37753","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-05-12T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97389","published_at":"2026-04-18T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41582","scoring_system":"epss","scoring_elements":"0.97424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.41582","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383","reference_id":"1369383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0462","reference_id":"RHSA-2017:0462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2708","reference_id":"RHSA-2017:2708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2709","reference_id":"RHSA-2017:2709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2710","reference_id":"RHSA-2017:2710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3239","reference_id":"RHSA-2017:3239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3240","reference_id":"RHSA-2017:3240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2123","reference_id":"RHSA-2018:2123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1245","reference_id":"RHSA-2019:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2859","reference_id":"RHSA-2019:2859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0451","reference_id":"RHSA-2020:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3842","reference_id":"RHSA-2020:3842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0308","reference_id":"RHSA-2021:0308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2438","reference_id":"RHSA-2021:2438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2438"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"},{"reference_url":"https://usn.ubuntu.com/3270-1/","reference_id":"USN-3270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3270-1/"},{"reference_url":"https://usn.ubuntu.com/3372-1/","reference_id":"USN-3372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3372-1/"}],"fixed_packages":[],"aliases":["CVE-2016-2183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1%3Farch=el6_8"}