{"url":"http://public2.vulnerablecode.io/api/packages/113178?format=json","purl":"pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.131-1jpp.1?arch=el7_3","type":"rpm","namespace":"redhat","name":"java-1.7.0-oracle","version":"1:1.7.0.131-1jpp.1","qualifiers":{"arch":"el7_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=json","vulnerability_id":"VCID-6383-1rzy-9kcr","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3252","reference_id":"","reference_type":"","scores":[{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59436","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59533","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413906","reference_id":"1413906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413906"},{"reference_url":"http://www.securityfocus.com/bid/95509","reference_id":"95509","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.securityfocus.com/bid/95509"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3252"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=json","vulnerability_id":"VCID-6xgm-xhae-3bbv","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5549","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67147","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413923","reference_id":"1413923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413923"},{"reference_url":"http://www.securityfocus.com/bid/95530","reference_id":"95530","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.securityfocus.com/bid/95530"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5549"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=json","vulnerability_id":"VCID-7ez7-vdry-wbep","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3289","reference_id":"","reference_type":"","scores":[{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413562","reference_id":"1413562","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413562"},{"reference_url":"http://www.securityfocus.com/bid/95525","reference_id":"95525","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.securityfocus.com/bid/95525"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3289"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=json","vulnerability_id":"VCID-ar8p-z4ww-wuau","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3241","reference_id":"","reference_type":"","scores":[{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98953","published_at":"2026-04-13T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98945","published_at":"2026-04-04T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.98952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.76808","scoring_system":"epss","scoring_elements":"0.9895","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413955","reference_id":"1413955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413955"},{"reference_url":"https://www.exploit-db.com/exploits/41145/","reference_id":"41145","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://www.exploit-db.com/exploits/41145/"},{"reference_url":"http://www.securityfocus.com/bid/95488","reference_id":"95488","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.securityfocus.com/bid/95488"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py","reference_id":"CVE-2017-3241","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/","reference_id":"erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3241"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=json","vulnerability_id":"VCID-c7sa-v6cu-d3ex","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5547","reference_id":"","reference_type":"","scores":[{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.7936","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413764","reference_id":"1413764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413764"},{"reference_url":"http://www.securityfocus.com/bid/95521","reference_id":"95521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.securityfocus.com/bid/95521"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5547"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=json","vulnerability_id":"VCID-e2zb-3859-qfe6","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5546","reference_id":"","reference_type":"","scores":[{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78594","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413911","reference_id":"1413911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413911"},{"reference_url":"http://www.securityfocus.com/bid/95506","reference_id":"95506","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.securityfocus.com/bid/95506"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5546"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=json","vulnerability_id":"VCID-ftnn-eurn-wydw","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3261","reference_id":"","reference_type":"","scores":[{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74991","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.7494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413653","reference_id":"1413653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413653"},{"reference_url":"http://www.securityfocus.com/bid/95566","reference_id":"95566","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.securityfocus.com/bid/95566"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3261"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=json","vulnerability_id":"VCID-k3pa-xdxn-ubbg","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3231","reference_id":"","reference_type":"","scores":[{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69227","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413717","reference_id":"1413717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413717"},{"reference_url":"http://www.securityfocus.com/bid/95563","reference_id":"95563","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.securityfocus.com/bid/95563"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3231"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=json","vulnerability_id":"VCID-kzak-fju8-eqew","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259","reference_id":"","reference_type":"","scores":[{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64576","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163","reference_id":"1414163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163"},{"reference_url":"http://www.securityfocus.com/bid/95570","reference_id":"95570","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securityfocus.com/bid/95570"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2017-3259"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=json","vulnerability_id":"VCID-qs1s-6yjm-jye5","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5552","reference_id":"","reference_type":"","scores":[{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.71993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.71996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72035","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"http://www.securitytracker.com/id/1037798","reference_id":"1037798","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securitytracker.com/id/1037798"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413882","reference_id":"1413882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413882"},{"reference_url":"https://source.android.com/security/bulletin/2017-02-01.html","reference_id":"2017-02-01.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://source.android.com/security/bulletin/2017-02-01.html"},{"reference_url":"http://www.securityfocus.com/bid/95512","reference_id":"95512","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.securityfocus.com/bid/95512"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5552"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=json","vulnerability_id":"VCID-snqh-ebq3-hubn","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5548","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67147","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413920","reference_id":"1413920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413920"},{"reference_url":"http://www.securityfocus.com/bid/95559","reference_id":"95559","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.securityfocus.com/bid/95559"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5548"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=json","vulnerability_id":"VCID-tc8v-xrjj-hucq","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3272","reference_id":"","reference_type":"","scores":[{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01126","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:M/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413554","reference_id":"1413554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413554"},{"reference_url":"http://www.securityfocus.com/bid/95533","reference_id":"95533","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.securityfocus.com/bid/95533"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3272"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=json","vulnerability_id":"VCID-v64t-4c46-3bhj","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3253","reference_id":"","reference_type":"","scores":[{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.82856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01827","scoring_system":"epss","scoring_elements":"0.8286","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413583","reference_id":"1413583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413583"},{"reference_url":"http://www.securityfocus.com/bid/95498","reference_id":"95498","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.securityfocus.com/bid/95498"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3782","reference_id":"dsa-3782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://www.debian.org/security/2017/dsa-3782"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0180","reference_id":"RHSA-2017:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0180"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html","reference_id":"RHSA-2017-0180.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0180.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0269","reference_id":"RHSA-2017:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0269"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html","reference_id":"RHSA-2017-0269.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0269.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3253"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.131-1jpp.1%3Farch=el7_3"}