{"url":"http://public2.vulnerablecode.io/api/packages/115341?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1?arch=el6_7","type":"rpm","namespace":"redhat","name":"java-1.6.0-ibm","version":"1:1.6.0.16.25-1jpp.1","qualifiers":{"arch":"el6_7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30942?format=json","vulnerability_id":"VCID-2v3q-7u91-syh3","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443","reference_id":"","reference_type":"","scores":[{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86667","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86636","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86482","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securityfocus.com/bid/86482"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618","reference_id":"1328618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443","reference_id":"CVE-2016-3443","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3443"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85230?format=json","vulnerability_id":"VCID-46bb-rmw3-47c5","summary":"JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0376","reference_id":"","reference_type":"","scores":[{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81529","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81533","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81511","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83323","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83426","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.8346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01931","scoring_system":"epss","scoring_elements":"0.83377","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0376"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/43","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/43"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf"},{"reference_url":"http://www.securityfocus.com/archive/1/538066/100/100/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/538066/100/100/threaded"},{"reference_url":"http://www.securityfocus.com/bid/89192","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89192"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330986","reference_id":"1330986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330986"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0376","reference_id":"CVE-2016-0376","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0376"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46bb-rmw3-47c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85199?format=json","vulnerability_id":"VCID-4ptw-ap8n-bkf2","summary":"JDK: buffer overflow vulnerability in the IBM JVM","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264","reference_id":"","reference_type":"","scores":[{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94128","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94123","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12943","scoring_system":"epss","scoring_elements":"0.94095","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359","reference_id":"1331359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264","reference_id":"CVE-2016-0264","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0264"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ptw-ap8n-bkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85268?format=json","vulnerability_id":"VCID-6t46-7fea-dyav","summary":"JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363","reference_id":"","reference_type":"","scores":[{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67906","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71691","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/20","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/20"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/3","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/3"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf"},{"reference_url":"http://www.securityfocus.com/bid/85895","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85895"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044","reference_id":"1324044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363","reference_id":"CVE-2016-0363","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-0363"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t46-7fea-dyav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30937?format=json","vulnerability_id":"VCID-8edn-xjyj-9fgf","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0687","reference_id":"","reference_type":"","scores":[{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86459","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.securityfocus.com/bid/86459"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327749","reference_id":"1327749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327749"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0687","reference_id":"CVE-2016-0687","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0687"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-0687"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8edn-xjyj-9fgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30939?format=json","vulnerability_id":"VCID-cmr5-b3n9-6uhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422","reference_id":"","reference_type":"","scores":[{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.8747","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.8799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87984","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86488","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securityfocus.com/bid/86488"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620","reference_id":"1328620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422","reference_id":"CVE-2016-3422","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30941?format=json","vulnerability_id":"VCID-jccp-8k75-xkhn","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3427","reference_id":"","reference_type":"","scores":[{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99878","published_at":"2026-05-12T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.9389","scoring_system":"epss","scoring_elements":"0.99877","published_at":"2026-05-07T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.94019","scoring_system":"epss","scoring_elements":"0.99898","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10159","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10159"},{"reference_url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/08/31/1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2020/08/31/1"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86421","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securityfocus.com/bid/86421"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.securitytracker.com/id/1037331","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.securitytracker.com/id/1037331"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328210","reference_id":"1328210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328210"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3427","reference_id":"CVE-2016-3427","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3427"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-3427"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jccp-8k75-xkhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30943?format=json","vulnerability_id":"VCID-qs56-bnkb-buhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449","reference_id":"","reference_type":"","scores":[{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88377","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.8839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88603","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8857","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86485","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securityfocus.com/bid/86485"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619","reference_id":"1328619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449","reference_id":"CVE-2016-3449","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[],"aliases":["CVE-2016-3449"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30936?format=json","vulnerability_id":"VCID-r7cu-ewk5-pygd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0676.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0723.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0686","reference_id":"","reference_type":"","scores":[{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05191","scoring_system":"epss","scoring_elements":"0.89989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05413","scoring_system":"epss","scoring_elements":"0.9017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86473","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.securityfocus.com/bid/86473"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2964-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2964-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2972-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"http://www.ubuntu.com/usn/USN-2972-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327743","reference_id":"1327743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327743"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0686","reference_id":"CVE-2016-0686","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0686"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0675","reference_id":"RHSA-2016:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0676","reference_id":"RHSA-2016:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0723","reference_id":"RHSA-2016:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"},{"reference_url":"https://usn.ubuntu.com/2964-1/","reference_id":"USN-2964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2964-1/"},{"reference_url":"https://usn.ubuntu.com/2972-1/","reference_id":"USN-2972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2972-1/"}],"fixed_packages":[],"aliases":["CVE-2016-0686"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7cu-ewk5-pygd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=json","vulnerability_id":"VCID-taqg-ukr5-ybbk","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426","reference_id":"","reference_type":"","scores":[{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80888","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81635","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86449","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securityfocus.com/bid/86449"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059","reference_id":"1328059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426","reference_id":"CVE-2016-3426","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"}],"fixed_packages":[],"aliases":["CVE-2016-3426"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1%3Farch=el6_7"}