Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
Typedeb
Namespacedebian
Nameopenjdk-7
Version7u95-2.6.4-1~deb7u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version7u181-2.6.14-1~deb8u1
Latest_non_vulnerable_version7u181-2.6.14-1~deb8u1
Affected_by_vulnerabilities
0
url VCID-1pew-7np4-vqfu
vulnerability_id VCID-1pew-7np4-vqfu
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5597
reference_id
reference_type
scores
0
value 0.01929
scoring_system epss
scoring_elements 0.83384
published_at 2026-04-13T12:55:00Z
1
value 0.01929
scoring_system epss
scoring_elements 0.83317
published_at 2026-04-01T12:55:00Z
2
value 0.01929
scoring_system epss
scoring_elements 0.83331
published_at 2026-04-02T12:55:00Z
3
value 0.01929
scoring_system epss
scoring_elements 0.83347
published_at 2026-04-04T12:55:00Z
4
value 0.01929
scoring_system epss
scoring_elements 0.83346
published_at 2026-04-07T12:55:00Z
5
value 0.01929
scoring_system epss
scoring_elements 0.8337
published_at 2026-04-08T12:55:00Z
6
value 0.01929
scoring_system epss
scoring_elements 0.8338
published_at 2026-04-09T12:55:00Z
7
value 0.01929
scoring_system epss
scoring_elements 0.83395
published_at 2026-04-11T12:55:00Z
8
value 0.01929
scoring_system epss
scoring_elements 0.83389
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://www.securitytracker.com/id/1037040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386103
reference_id 1386103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386103
10
reference_url http://www.securityfocus.com/bid/93636
reference_id 93636
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://www.securityfocus.com/bid/93636
11
reference_url http://www.debian.org/security/2016/dsa-3707
reference_id dsa-3707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://www.debian.org/security/2016/dsa-3707
12
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url https://security.gentoo.org/glsa/201611-04
13
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url https://security.gentoo.org/glsa/201701-43
14
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2016:2079
reference_id RHSA-2016:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2079
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-2079.html
reference_id RHSA-2016-2079.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2079.html
17
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2136
reference_id RHSA-2016:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2136
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-2136.html
reference_id RHSA-2016-2136.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2136.html
25
reference_url https://access.redhat.com/errata/RHSA-2016:2137
reference_id RHSA-2016:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2137
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-2137.html
reference_id RHSA-2016-2137.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2137.html
27
reference_url https://access.redhat.com/errata/RHSA-2016:2138
reference_id RHSA-2016:2138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2138
28
reference_url http://rhn.redhat.com/errata/RHSA-2016-2138.html
reference_id RHSA-2016-2138.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2138.html
29
reference_url https://access.redhat.com/errata/RHSA-2016:2658
reference_id RHSA-2016:2658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2658
30
reference_url http://rhn.redhat.com/errata/RHSA-2016-2658.html
reference_id RHSA-2016-2658.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2658.html
31
reference_url https://access.redhat.com/errata/RHSA-2016:2659
reference_id RHSA-2016:2659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2659
32
reference_url http://rhn.redhat.com/errata/RHSA-2016-2659.html
reference_id RHSA-2016-2659.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2016-2659.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0061
reference_id RHSA-2017:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0061
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0061.html
reference_id RHSA-2017-0061.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0061.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url https://access.redhat.com/errata/RHSA-2017:1216
36
reference_url https://usn.ubuntu.com/3121-1/
reference_id USN-3121-1
reference_type
scores
url https://usn.ubuntu.com/3121-1/
37
reference_url https://usn.ubuntu.com/3130-1/
reference_id USN-3130-1
reference_type
scores
url https://usn.ubuntu.com/3130-1/
38
reference_url http://www.ubuntu.com/usn/USN-3130-1
reference_id USN-3130-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://www.ubuntu.com/usn/USN-3130-1
39
reference_url https://usn.ubuntu.com/3154-1/
reference_id USN-3154-1
reference_type
scores
url https://usn.ubuntu.com/3154-1/
40
reference_url http://www.ubuntu.com/usn/USN-3154-1
reference_id USN-3154-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/
url http://www.ubuntu.com/usn/USN-3154-1
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5597
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu
1
url VCID-1x1r-hjrb-6ydb
vulnerability_id VCID-1x1r-hjrb-6ydb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52614
published_at 2026-04-02T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52571
published_at 2026-04-01T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.5264
published_at 2026-04-04T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52607
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52658
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52653
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52703
published_at 2026-04-11T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52686
published_at 2026-04-12T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52671
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
reference_id 1471711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
29
reference_url http://www.securityfocus.com/bid/99853
reference_id 99853
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securityfocus.com/bid/99853
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10081
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1r-hjrb-6ydb
2
url VCID-1yfj-cdt7-1yhf
vulnerability_id VCID-1yfj-cdt7-1yhf
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3526
reference_id
reference_type
scores
0
value 0.01924
scoring_system epss
scoring_elements 0.83327
published_at 2026-04-07T12:55:00Z
1
value 0.01924
scoring_system epss
scoring_elements 0.83366
published_at 2026-04-13T12:55:00Z
2
value 0.01924
scoring_system epss
scoring_elements 0.83311
published_at 2026-04-02T12:55:00Z
3
value 0.01924
scoring_system epss
scoring_elements 0.8337
published_at 2026-04-12T12:55:00Z
4
value 0.01924
scoring_system epss
scoring_elements 0.83376
published_at 2026-04-11T12:55:00Z
5
value 0.01924
scoring_system epss
scoring_elements 0.83351
published_at 2026-04-08T12:55:00Z
6
value 0.01924
scoring_system epss
scoring_elements 0.83297
published_at 2026-04-01T12:55:00Z
7
value 0.01924
scoring_system epss
scoring_elements 0.83328
published_at 2026-04-04T12:55:00Z
8
value 0.01924
scoring_system epss
scoring_elements 0.83361
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url http://www.debian.org/security/2017/dsa-3858
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
11
reference_url http://www.securityfocus.com/bid/97733
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url http://www.securityfocus.com/bid/97733
12
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url http://www.securitytracker.com/id/1038286
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443252
reference_id 1443252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443252
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3526
reference_id CVE-2017-3526
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3526
22
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://security.gentoo.org/glsa/201705-03
23
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://security.gentoo.org/glsa/201707-01
24
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1108
25
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1109
26
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1117
27
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1118
28
reference_url https://access.redhat.com/errata/RHSA-2017:1119
reference_id RHSA-2017:1119
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1119
29
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/
url https://access.redhat.com/errata/RHSA-2017:1204
30
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
31
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3526
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yfj-cdt7-1yhf
3
url VCID-27zg-g9hc-4bg1
vulnerability_id VCID-27zg-g9hc-4bg1
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2800.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2800
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47455
published_at 2026-04-13T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54619
published_at 2026-04-01T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-02T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54711
published_at 2026-04-04T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54681
published_at 2026-04-07T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54734
published_at 2026-04-08T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.5473
published_at 2026-04-09T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-11T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54727
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103849
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url http://www.securityfocus.com/bid/103849
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568163
reference_id 1568163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568163
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2800
reference_id CVE-2018-2800
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2800
51
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://security.gentoo.org/glsa/201903-14
52
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1188
53
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1191
54
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1201
55
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1202
56
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1203
57
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1204
58
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1205
59
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1206
60
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1270
61
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1278
62
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1721
63
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1722
64
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1723
65
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1724
66
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1974
67
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://access.redhat.com/errata/RHSA-2018:1975
68
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://usn.ubuntu.com/3644-1/
69
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2800
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27zg-g9hc-4bg1
4
url VCID-2jc9-6xf6-63a6
vulnerability_id VCID-2jc9-6xf6-63a6
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2641
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38172
published_at 2026-04-02T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38081
published_at 2026-04-13T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38105
published_at 2026-04-12T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38141
published_at 2026-04-11T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38123
published_at 2026-04-09T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38115
published_at 2026-04-08T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38065
published_at 2026-04-07T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38195
published_at 2026-04-04T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.37992
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102605
reference_id 102605
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url http://www.securityfocus.com/bid/102605
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534766
reference_id 1534766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534766
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2641
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jc9-6xf6-63a6
5
url VCID-2krr-m59b-77a7
vulnerability_id VCID-2krr-m59b-77a7
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-1587.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-1587.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-1588.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-1588.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-1589.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://rhn.redhat.com/errata/RHSA-2016-1589.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3598
reference_id
reference_type
scores
0
value 0.07073
scoring_system epss
scoring_elements 0.91469
published_at 2026-04-01T12:55:00Z
1
value 0.07073
scoring_system epss
scoring_elements 0.91514
published_at 2026-04-13T12:55:00Z
2
value 0.07073
scoring_system epss
scoring_elements 0.91516
published_at 2026-04-12T12:55:00Z
3
value 0.07073
scoring_system epss
scoring_elements 0.91515
published_at 2026-04-11T12:55:00Z
4
value 0.07073
scoring_system epss
scoring_elements 0.91509
published_at 2026-04-09T12:55:00Z
5
value 0.07073
scoring_system epss
scoring_elements 0.91503
published_at 2026-04-08T12:55:00Z
6
value 0.07073
scoring_system epss
scoring_elements 0.9149
published_at 2026-04-07T12:55:00Z
7
value 0.07073
scoring_system epss
scoring_elements 0.91482
published_at 2026-04-04T12:55:00Z
8
value 0.07073
scoring_system epss
scoring_elements 0.91475
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3598
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
25
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
26
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.securityfocus.com/bid/91787
27
reference_url http://www.securityfocus.com/bid/91918
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.securityfocus.com/bid/91918
28
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.securitytracker.com/id/1036365
29
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.ubuntu.com/usn/USN-3043-1
30
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url http://www.ubuntu.com/usn/USN-3062-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1356971
reference_id 1356971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1356971
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3598
reference_id CVE-2016-3598
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3598
40
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://security.gentoo.org/glsa/201610-08
41
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://security.gentoo.org/glsa/201701-43
42
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://access.redhat.com/errata/RHSA-2016:1458
43
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://access.redhat.com/errata/RHSA-2016:1475
44
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
45
reference_url https://access.redhat.com/errata/RHSA-2016:1587
reference_id RHSA-2016:1587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1587
46
reference_url https://access.redhat.com/errata/RHSA-2016:1588
reference_id RHSA-2016:1588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1588
47
reference_url https://access.redhat.com/errata/RHSA-2016:1589
reference_id RHSA-2016:1589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1589
48
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/
url https://access.redhat.com/errata/RHSA-2017:1216
49
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
50
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3598
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7
6
url VCID-2r75-1ccm-d7aw
vulnerability_id VCID-2r75-1ccm-d7aw
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10345.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10345
reference_id
reference_type
scores
0
value 0.00762
scoring_system epss
scoring_elements 0.73363
published_at 2026-04-13T12:55:00Z
1
value 0.00762
scoring_system epss
scoring_elements 0.73312
published_at 2026-04-01T12:55:00Z
2
value 0.00762
scoring_system epss
scoring_elements 0.73321
published_at 2026-04-02T12:55:00Z
3
value 0.00762
scoring_system epss
scoring_elements 0.73345
published_at 2026-04-04T12:55:00Z
4
value 0.00762
scoring_system epss
scoring_elements 0.73317
published_at 2026-04-07T12:55:00Z
5
value 0.00762
scoring_system epss
scoring_elements 0.73354
published_at 2026-04-08T12:55:00Z
6
value 0.00762
scoring_system epss
scoring_elements 0.73367
published_at 2026-04-09T12:55:00Z
7
value 0.00762
scoring_system epss
scoring_elements 0.73391
published_at 2026-04-11T12:55:00Z
8
value 0.00762
scoring_system epss
scoring_elements 0.73371
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101396
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url http://www.securityfocus.com/bid/101396
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502858
reference_id 1502858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502858
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10345
reference_id CVE-2017-10345
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10345
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10345
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r75-1ccm-d7aw
7
url VCID-3mqp-7bx4-jbhv
vulnerability_id VCID-3mqp-7bx4-jbhv
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10176
reference_id
reference_type
scores
0
value 0.02457
scoring_system epss
scoring_elements 0.85223
published_at 2026-04-13T12:55:00Z
1
value 0.02457
scoring_system epss
scoring_elements 0.85185
published_at 2026-04-07T12:55:00Z
2
value 0.02457
scoring_system epss
scoring_elements 0.85207
published_at 2026-04-08T12:55:00Z
3
value 0.02457
scoring_system epss
scoring_elements 0.85215
published_at 2026-04-09T12:55:00Z
4
value 0.02457
scoring_system epss
scoring_elements 0.85229
published_at 2026-04-11T12:55:00Z
5
value 0.02457
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-12T12:55:00Z
6
value 0.02761
scoring_system epss
scoring_elements 0.85985
published_at 2026-04-04T12:55:00Z
7
value 0.02761
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-02T12:55:00Z
8
value 0.02761
scoring_system epss
scoring_elements 0.85957
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472476
reference_id 1472476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472476
29
reference_url http://www.securityfocus.com/bid/99788
reference_id 99788
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.securityfocus.com/bid/99788
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
37
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
38
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10176
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mqp-7bx4-jbhv
8
url VCID-3xyb-xeyq-n3dm
vulnerability_id VCID-3xyb-xeyq-n3dm
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65549
published_at 2026-04-13T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65466
published_at 2026-04-01T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65514
published_at 2026-04-02T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65542
published_at 2026-04-04T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65508
published_at 2026-04-07T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.6556
published_at 2026-04-08T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65571
published_at 2026-04-09T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.6559
published_at 2026-04-11T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65577
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
reference_id 1471517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
29
reference_url http://www.securityfocus.com/bid/99706
reference_id 99706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securityfocus.com/bid/99706
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:3453
41
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
42
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10090
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xyb-xeyq-n3dm
9
url VCID-49z5-4djw-xuav
vulnerability_id VCID-49z5-4djw-xuav
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
reference_id 1471527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
29
reference_url http://www.securityfocus.com/bid/99674
reference_id 99674
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securityfocus.com/bid/99674
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10101
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49z5-4djw-xuav
10
url VCID-4p3u-gdhr-jucj
vulnerability_id VCID-4p3u-gdhr-jucj
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0402
reference_id
reference_type
scores
0
value 0.03273
scoring_system epss
scoring_elements 0.87168
published_at 2026-04-13T12:55:00Z
1
value 0.03273
scoring_system epss
scoring_elements 0.87172
published_at 2026-04-12T12:55:00Z
2
value 0.03273
scoring_system epss
scoring_elements 0.87113
published_at 2026-04-01T12:55:00Z
3
value 0.03273
scoring_system epss
scoring_elements 0.87123
published_at 2026-04-02T12:55:00Z
4
value 0.03273
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-04T12:55:00Z
5
value 0.03273
scoring_system epss
scoring_elements 0.87137
published_at 2026-04-07T12:55:00Z
6
value 0.03273
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-08T12:55:00Z
7
value 0.03273
scoring_system epss
scoring_elements 0.87165
published_at 2026-04-09T12:55:00Z
8
value 0.03273
scoring_system epss
scoring_elements 0.87178
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0402
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securityfocus.com/bid/81096
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81096
46
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
47
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
48
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298957
reference_id 1298957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298957
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0402
reference_id CVE-2016-0402
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0402
61
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
62
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
63
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
64
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
65
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
66
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
67
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
68
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
69
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
70
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
71
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
72
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
73
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
74
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
75
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
76
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
77
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0402
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj
11
url VCID-4ucs-3zp9-rqey
vulnerability_id VCID-4ucs-3zp9-rqey
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
reference_id
reference_type
scores
0
value 0.0128
scoring_system epss
scoring_elements 0.79573
published_at 2026-04-13T12:55:00Z
1
value 0.0128
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-01T12:55:00Z
2
value 0.0128
scoring_system epss
scoring_elements 0.79531
published_at 2026-04-02T12:55:00Z
3
value 0.0128
scoring_system epss
scoring_elements 0.79553
published_at 2026-04-04T12:55:00Z
4
value 0.0128
scoring_system epss
scoring_elements 0.79539
published_at 2026-04-07T12:55:00Z
5
value 0.0128
scoring_system epss
scoring_elements 0.79568
published_at 2026-04-08T12:55:00Z
6
value 0.0128
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-09T12:55:00Z
7
value 0.0128
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-11T12:55:00Z
8
value 0.0128
scoring_system epss
scoring_elements 0.79581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
reference_id 1471889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
29
reference_url http://www.securityfocus.com/bid/99842
reference_id 99842
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securityfocus.com/bid/99842
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10053
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ucs-3zp9-rqey
12
url VCID-4zte-62md-kyd8
vulnerability_id VCID-4zte-62md-kyd8
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2599
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23234
published_at 2026-04-13T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.2318
published_at 2026-04-01T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23357
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23397
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23258
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23309
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.2333
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23292
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102633
reference_id 102633
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url http://www.securityfocus.com/bid/102633
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534543
reference_id 1534543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534543
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2599
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zte-62md-kyd8
13
url VCID-5jvq-evzj-tfcc
vulnerability_id VCID-5jvq-evzj-tfcc
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
reference_id 1471270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
29
reference_url http://www.securityfocus.com/bid/99659
reference_id 99659
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securityfocus.com/bid/99659
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10089
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvq-evzj-tfcc
14
url VCID-5vrc-h4t3-uucb
vulnerability_id VCID-5vrc-h4t3-uucb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76363
published_at 2026-04-12T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76299
published_at 2026-04-01T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76302
published_at 2026-04-02T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76332
published_at 2026-04-04T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.76312
published_at 2026-04-07T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76345
published_at 2026-04-08T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76358
published_at 2026-04-13T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
reference_id 1472666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
29
reference_url http://www.securityfocus.com/bid/99827
reference_id 99827
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securityfocus.com/bid/99827
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10243
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vrc-h4t3-uucb
15
url VCID-6383-1rzy-9kcr
vulnerability_id VCID-6383-1rzy-9kcr
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3252
reference_id
reference_type
scores
0
value 0.00381
scoring_system epss
scoring_elements 0.59436
published_at 2026-04-01T12:55:00Z
1
value 0.00381
scoring_system epss
scoring_elements 0.59549
published_at 2026-04-13T12:55:00Z
2
value 0.00381
scoring_system epss
scoring_elements 0.59568
published_at 2026-04-12T12:55:00Z
3
value 0.00381
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-11T12:55:00Z
4
value 0.00381
scoring_system epss
scoring_elements 0.59566
published_at 2026-04-09T12:55:00Z
5
value 0.00381
scoring_system epss
scoring_elements 0.59553
published_at 2026-04-08T12:55:00Z
6
value 0.00381
scoring_system epss
scoring_elements 0.59508
published_at 2026-04-02T12:55:00Z
7
value 0.00381
scoring_system epss
scoring_elements 0.59502
published_at 2026-04-07T12:55:00Z
8
value 0.00381
scoring_system epss
scoring_elements 0.59533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413906
reference_id 1413906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413906
17
reference_url http://www.securityfocus.com/bid/95509
reference_id 95509
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://www.securityfocus.com/bid/95509
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3252
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr
16
url VCID-69zc-r9uw-jke5
vulnerability_id VCID-69zc-r9uw-jke5
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3511
reference_id
reference_type
scores
0
value 0.01597
scoring_system epss
scoring_elements 0.81687
published_at 2026-04-12T12:55:00Z
1
value 0.01597
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-01T12:55:00Z
2
value 0.01597
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-02T12:55:00Z
3
value 0.01597
scoring_system epss
scoring_elements 0.8165
published_at 2026-04-04T12:55:00Z
4
value 0.01597
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-07T12:55:00Z
5
value 0.01597
scoring_system epss
scoring_elements 0.81675
published_at 2026-04-08T12:55:00Z
6
value 0.01597
scoring_system epss
scoring_elements 0.8168
published_at 2026-04-13T12:55:00Z
7
value 0.01597
scoring_system epss
scoring_elements 0.817
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url http://www.debian.org/security/2017/dsa-3858
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
11
reference_url http://www.securityfocus.com/bid/97731
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url http://www.securityfocus.com/bid/97731
12
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url http://www.securitytracker.com/id/1038286
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443007
reference_id 1443007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443007
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3511
reference_id CVE-2017-3511
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3511
22
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://security.gentoo.org/glsa/201705-03
23
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://security.gentoo.org/glsa/201707-01
24
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1108
25
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1109
26
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1117
27
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1118
28
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1204
29
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1220
30
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:1221
31
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/
url https://access.redhat.com/errata/RHSA-2017:3453
32
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
33
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3511
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69zc-r9uw-jke5
17
url VCID-6aph-ab51-2qbt
vulnerability_id VCID-6aph-ab51-2qbt
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2677
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21184
published_at 2026-04-13T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21166
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21374
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21207
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21268
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21278
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102656
reference_id 102656
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url http://www.securityfocus.com/bid/102656
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534288
reference_id 1534288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534288
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
25
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
26
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0095
27
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0099
28
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0100
29
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0115
30
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0349
31
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0351
32
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0352
33
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0458
34
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:0521
35
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:1463
36
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://access.redhat.com/errata/RHSA-2018:1812
37
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://usn.ubuntu.com/3613-1/
38
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2677
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6aph-ab51-2qbt
18
url VCID-6qtk-xzvb-ubfr
vulnerability_id VCID-6qtk-xzvb-ubfr
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2795.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2795
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2799
published_at 2026-04-02T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27931
published_at 2026-04-11T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.2793
published_at 2026-04-09T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27889
published_at 2026-04-12T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27822
published_at 2026-04-07T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.28031
published_at 2026-04-04T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27936
published_at 2026-04-01T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39527
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103847
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url http://www.securityfocus.com/bid/103847
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567351
reference_id 1567351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567351
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2795
reference_id CVE-2018-2795
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2795
53
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://security.gentoo.org/glsa/201903-14
54
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1188
55
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1191
56
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1201
57
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1202
58
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1203
59
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1204
60
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1205
61
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1206
62
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1270
63
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1278
64
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1721
65
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1722
66
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1723
67
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1724
68
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1974
69
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://access.redhat.com/errata/RHSA-2018:1975
70
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://usn.ubuntu.com/3644-1/
71
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2795
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qtk-xzvb-ubfr
19
url VCID-6xzp-k5m9-ykbc
vulnerability_id VCID-6xzp-k5m9-ykbc
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2588
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.57055
published_at 2026-04-01T12:55:00Z
1
value 0.00346
scoring_system epss
scoring_elements 0.5715
published_at 2026-04-02T12:55:00Z
2
value 0.00346
scoring_system epss
scoring_elements 0.57197
published_at 2026-04-12T12:55:00Z
3
value 0.00346
scoring_system epss
scoring_elements 0.57216
published_at 2026-04-11T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57204
published_at 2026-04-09T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57202
published_at 2026-04-08T12:55:00Z
6
value 0.00346
scoring_system epss
scoring_elements 0.57151
published_at 2026-04-07T12:55:00Z
7
value 0.00346
scoring_system epss
scoring_elements 0.57173
published_at 2026-04-04T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102661
reference_id 102661
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url http://www.securityfocus.com/bid/102661
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534299
reference_id 1534299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534299
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2588
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xzp-k5m9-ykbc
20
url VCID-7d2e-14yp-pkhq
vulnerability_id VCID-7d2e-14yp-pkhq
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-01T12:55:00Z
1
value 0.00937
scoring_system epss
scoring_elements 0.76162
published_at 2026-04-04T12:55:00Z
2
value 0.00937
scoring_system epss
scoring_elements 0.76129
published_at 2026-04-02T12:55:00Z
3
value 0.0165
scoring_system epss
scoring_elements 0.82007
published_at 2026-04-13T12:55:00Z
4
value 0.0165
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-07T12:55:00Z
5
value 0.0165
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-08T12:55:00Z
6
value 0.0165
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-09T12:55:00Z
7
value 0.0165
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-11T12:55:00Z
8
value 0.0165
scoring_system epss
scoring_elements 0.82013
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
reference_id 1471738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
29
reference_url http://www.securityfocus.com/bid/99734
reference_id 99734
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securityfocus.com/bid/99734
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10116
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d2e-14yp-pkhq
21
url VCID-7ez7-vdry-wbep
vulnerability_id VCID-7ez7-vdry-wbep
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3289
reference_id
reference_type
scores
0
value 0.01126
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-01T12:55:00Z
1
value 0.01126
scoring_system epss
scoring_elements 0.78285
published_at 2026-04-13T12:55:00Z
2
value 0.01126
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-12T12:55:00Z
3
value 0.01126
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-11T12:55:00Z
4
value 0.01126
scoring_system epss
scoring_elements 0.78282
published_at 2026-04-09T12:55:00Z
5
value 0.01126
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-08T12:55:00Z
6
value 0.01126
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-02T12:55:00Z
7
value 0.01126
scoring_system epss
scoring_elements 0.7825
published_at 2026-04-07T12:55:00Z
8
value 0.01126
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413562
reference_id 1413562
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413562
17
reference_url http://www.securityfocus.com/bid/95525
reference_id 95525
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://www.securityfocus.com/bid/95525
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/
url https://access.redhat.com/errata/RHSA-2017:1216
38
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
39
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3289
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep
22
url VCID-8edn-xjyj-9fgf
vulnerability_id VCID-8edn-xjyj-9fgf
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0675.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0675.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0676.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0676.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-0723.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-0723.html
27
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
28
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json
29
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0687
reference_id
reference_type
scores
0
value 0.05413
scoring_system epss
scoring_elements 0.90101
published_at 2026-04-01T12:55:00Z
1
value 0.05413
scoring_system epss
scoring_elements 0.90104
published_at 2026-04-02T12:55:00Z
2
value 0.05413
scoring_system epss
scoring_elements 0.90115
published_at 2026-04-04T12:55:00Z
3
value 0.05413
scoring_system epss
scoring_elements 0.9012
published_at 2026-04-07T12:55:00Z
4
value 0.05413
scoring_system epss
scoring_elements 0.90135
published_at 2026-04-08T12:55:00Z
5
value 0.05413
scoring_system epss
scoring_elements 0.90141
published_at 2026-04-09T12:55:00Z
6
value 0.05413
scoring_system epss
scoring_elements 0.9015
published_at 2026-04-11T12:55:00Z
7
value 0.05413
scoring_system epss
scoring_elements 0.90149
published_at 2026-04-12T12:55:00Z
8
value 0.05413
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0687
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
37
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
38
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
39
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.debian.org/security/2016/dsa-3558
40
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
41
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
42
reference_url http://www.securityfocus.com/bid/86459
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.securityfocus.com/bid/86459
43
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.securitytracker.com/id/1035596
44
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.ubuntu.com/usn/USN-2963-1
45
reference_url http://www.ubuntu.com/usn/USN-2964-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.ubuntu.com/usn/USN-2964-1
46
reference_url http://www.ubuntu.com/usn/USN-2972-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url http://www.ubuntu.com/usn/USN-2972-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327749
reference_id 1327749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327749
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0687
reference_id CVE-2016-0687
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0687
55
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url https://security.gentoo.org/glsa/201606-18
56
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
57
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
58
reference_url https://access.redhat.com/errata/RHSA-2016:0675
reference_id RHSA-2016:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0675
59
reference_url https://access.redhat.com/errata/RHSA-2016:0676
reference_id RHSA-2016:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0676
60
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
61
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
62
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
63
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
64
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
65
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
66
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
67
reference_url https://access.redhat.com/errata/RHSA-2016:0723
reference_id RHSA-2016:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0723
68
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
69
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url https://access.redhat.com/errata/RHSA-2016:1430
70
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/
url https://access.redhat.com/errata/RHSA-2017:1216
71
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
72
reference_url https://usn.ubuntu.com/2964-1/
reference_id USN-2964-1
reference_type
scores
url https://usn.ubuntu.com/2964-1/
73
reference_url https://usn.ubuntu.com/2972-1/
reference_id USN-2972-1
reference_type
scores
url https://usn.ubuntu.com/2972-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0687
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8edn-xjyj-9fgf
23
url VCID-8f22-4b8p-m3aa
vulnerability_id VCID-8f22-4b8p-m3aa
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2602
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20331
published_at 2026-04-04T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20126
published_at 2026-04-01T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20055
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20135
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20193
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20172
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20273
published_at 2026-04-02T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20858
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102642
reference_id 102642
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url http://www.securityfocus.com/bid/102642
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534525
reference_id 1534525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534525
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2602
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8f22-4b8p-m3aa
24
url VCID-8t17-88c7-xqcz
vulnerability_id VCID-8t17-88c7-xqcz
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.61005
published_at 2026-04-13T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.60887
published_at 2026-04-01T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-02T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.60989
published_at 2026-04-04T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.60954
published_at 2026-04-07T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.61002
published_at 2026-04-08T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.61018
published_at 2026-04-09T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61039
published_at 2026-04-11T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61025
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
reference_id 1471871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
29
reference_url http://www.securityfocus.com/bid/99839
reference_id 99839
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securityfocus.com/bid/99839
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
41
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10135
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8t17-88c7-xqcz
25
url VCID-8vr7-v6d5-gfhw
vulnerability_id VCID-8vr7-v6d5-gfhw
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10388.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10388
reference_id
reference_type
scores
0
value 0.00544
scoring_system epss
scoring_elements 0.67679
published_at 2026-04-01T12:55:00Z
1
value 0.00544
scoring_system epss
scoring_elements 0.67754
published_at 2026-04-13T12:55:00Z
2
value 0.00544
scoring_system epss
scoring_elements 0.67789
published_at 2026-04-12T12:55:00Z
3
value 0.00544
scoring_system epss
scoring_elements 0.67803
published_at 2026-04-11T12:55:00Z
4
value 0.00544
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-07T12:55:00Z
5
value 0.00544
scoring_system epss
scoring_elements 0.67779
published_at 2026-04-09T12:55:00Z
6
value 0.00544
scoring_system epss
scoring_elements 0.67765
published_at 2026-04-08T12:55:00Z
7
value 0.00544
scoring_system epss
scoring_elements 0.67733
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:N
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
23
reference_url http://www.securityfocus.com/bid/101321
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url http://www.securityfocus.com/bid/101321
24
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url http://www.securitytracker.com/id/1039596
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502038
reference_id 1502038
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502038
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10388
reference_id CVE-2017-10388
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10388
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10388
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vr7-v6d5-gfhw
26
url VCID-8y3w-1sev-27d4
vulnerability_id VCID-8y3w-1sev-27d4
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10356.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10356
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.718
published_at 2026-04-01T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.71858
published_at 2026-04-12T12:55:00Z
2
value 0.00693
scoring_system epss
scoring_elements 0.71876
published_at 2026-04-11T12:55:00Z
3
value 0.00693
scoring_system epss
scoring_elements 0.7181
published_at 2026-04-02T12:55:00Z
4
value 0.00693
scoring_system epss
scoring_elements 0.71852
published_at 2026-04-09T12:55:00Z
5
value 0.00693
scoring_system epss
scoring_elements 0.71802
published_at 2026-04-07T12:55:00Z
6
value 0.00693
scoring_system epss
scoring_elements 0.71828
published_at 2026-04-04T12:55:00Z
7
value 0.00693
scoring_system epss
scoring_elements 0.71841
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10356
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101413
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url http://www.securityfocus.com/bid/101413
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503169
reference_id 1503169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503169
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10356
reference_id CVE-2017-10356
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10356
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3264
87
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3267
88
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3268
89
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3392
90
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/
url https://access.redhat.com/errata/RHSA-2017:3453
91
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
92
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10356
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8y3w-1sev-27d4
27
url VCID-9bbp-mutu-bqbf
vulnerability_id VCID-9bbp-mutu-bqbf
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10347.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10347
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101382
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url http://www.securityfocus.com/bid/101382
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502632
reference_id 1502632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502632
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10347
reference_id CVE-2017-10347
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10347
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3264
87
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3267
88
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3268
89
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3392
90
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/
url https://access.redhat.com/errata/RHSA-2017:3453
91
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
92
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10347
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9bbp-mutu-bqbf
28
url VCID-9yds-dpzg-4ba9
vulnerability_id VCID-9yds-dpzg-4ba9
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.71384
published_at 2026-04-13T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.7134
published_at 2026-04-07T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71348
published_at 2026-04-02T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71366
published_at 2026-04-04T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71393
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71417
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71401
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
reference_id 1472345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
29
reference_url http://www.securityfocus.com/bid/99712
reference_id 99712
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securityfocus.com/bid/99712
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10102
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yds-dpzg-4ba9
29
url VCID-a6rq-d1rv-j7dn
vulnerability_id VCID-a6rq-d1rv-j7dn
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10285.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10285
reference_id
reference_type
scores
0
value 0.00578
scoring_system epss
scoring_elements 0.68814
published_at 2026-04-04T12:55:00Z
1
value 0.00578
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-13T12:55:00Z
2
value 0.00578
scoring_system epss
scoring_elements 0.68871
published_at 2026-04-12T12:55:00Z
3
value 0.00578
scoring_system epss
scoring_elements 0.68885
published_at 2026-04-11T12:55:00Z
4
value 0.00578
scoring_system epss
scoring_elements 0.68794
published_at 2026-04-02T12:55:00Z
5
value 0.00578
scoring_system epss
scoring_elements 0.68862
published_at 2026-04-09T12:55:00Z
6
value 0.00578
scoring_system epss
scoring_elements 0.68793
published_at 2026-04-07T12:55:00Z
7
value 0.00578
scoring_system epss
scoring_elements 0.68776
published_at 2026-04-01T12:55:00Z
8
value 0.00578
scoring_system epss
scoring_elements 0.68843
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
23
reference_url http://www.securityfocus.com/bid/101319
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url http://www.securityfocus.com/bid/101319
24
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url http://www.securitytracker.com/id/1039596
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501868
reference_id 1501868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501868
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10285
reference_id CVE-2017-10285
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10285
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10285
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6rq-d1rv-j7dn
30
url VCID-ar8p-z4ww-wuau
vulnerability_id VCID-ar8p-z4ww-wuau
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3241
reference_id
reference_type
scores
0
value 0.76808
scoring_system epss
scoring_elements 0.98941
published_at 2026-04-01T12:55:00Z
1
value 0.76808
scoring_system epss
scoring_elements 0.98953
published_at 2026-04-13T12:55:00Z
2
value 0.76808
scoring_system epss
scoring_elements 0.98943
published_at 2026-04-02T12:55:00Z
3
value 0.76808
scoring_system epss
scoring_elements 0.98948
published_at 2026-04-07T12:55:00Z
4
value 0.76808
scoring_system epss
scoring_elements 0.98945
published_at 2026-04-04T12:55:00Z
5
value 0.76808
scoring_system epss
scoring_elements 0.98952
published_at 2026-04-12T12:55:00Z
6
value 0.76808
scoring_system epss
scoring_elements 0.9895
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413955
reference_id 1413955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413955
17
reference_url https://www.exploit-db.com/exploits/41145/
reference_id 41145
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://www.exploit-db.com/exploits/41145/
18
reference_url http://www.securityfocus.com/bid/95488
reference_id 95488
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://www.securityfocus.com/bid/95488
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py
reference_id CVE-2017-3241
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py
21
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://www.debian.org/security/2017/dsa-3782
22
reference_url https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/
reference_id erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/
23
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://security.gentoo.org/glsa/201701-65
24
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://security.gentoo.org/glsa/201707-01
25
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
26
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
27
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
28
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
29
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
30
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
31
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
32
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
33
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
34
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
35
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
36
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
37
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
38
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
39
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
40
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
41
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
42
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
43
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
44
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/
url https://access.redhat.com/errata/RHSA-2017:1216
45
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
46
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
47
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3241
risk_score 10.0
exploitability 2.0
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau
31
url VCID-awrz-da8u-7ud2
vulnerability_id VCID-awrz-da8u-7ud2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
reference_id 1471528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
29
reference_url http://www.securityfocus.com/bid/99670
reference_id 99670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securityfocus.com/bid/99670
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10096
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awrz-da8u-7ud2
32
url VCID-b15r-cqd5-rugd
vulnerability_id VCID-b15r-cqd5-rugd
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5554
reference_id
reference_type
scores
0
value 0.02018
scoring_system epss
scoring_elements 0.83752
published_at 2026-04-13T12:55:00Z
1
value 0.02018
scoring_system epss
scoring_elements 0.83686
published_at 2026-04-01T12:55:00Z
2
value 0.02018
scoring_system epss
scoring_elements 0.83699
published_at 2026-04-02T12:55:00Z
3
value 0.02018
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-04T12:55:00Z
4
value 0.02018
scoring_system epss
scoring_elements 0.83716
published_at 2026-04-07T12:55:00Z
5
value 0.02018
scoring_system epss
scoring_elements 0.8374
published_at 2026-04-08T12:55:00Z
6
value 0.02018
scoring_system epss
scoring_elements 0.83746
published_at 2026-04-09T12:55:00Z
7
value 0.02018
scoring_system epss
scoring_elements 0.83763
published_at 2026-04-11T12:55:00Z
8
value 0.02018
scoring_system epss
scoring_elements 0.83756
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5554
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://www.securitytracker.com/id/1037040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1385714
reference_id 1385714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1385714
10
reference_url http://www.securityfocus.com/bid/93637
reference_id 93637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://www.securityfocus.com/bid/93637
11
reference_url http://www.debian.org/security/2016/dsa-3707
reference_id dsa-3707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://www.debian.org/security/2016/dsa-3707
12
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url https://security.gentoo.org/glsa/201611-04
13
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url https://security.gentoo.org/glsa/201701-43
14
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2016:2079
reference_id RHSA-2016:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2079
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-2079.html
reference_id RHSA-2016-2079.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2079.html
17
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2136
reference_id RHSA-2016:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2136
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-2136.html
reference_id RHSA-2016-2136.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2136.html
25
reference_url https://access.redhat.com/errata/RHSA-2016:2137
reference_id RHSA-2016:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2137
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-2137.html
reference_id RHSA-2016-2137.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2137.html
27
reference_url https://access.redhat.com/errata/RHSA-2016:2138
reference_id RHSA-2016:2138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2138
28
reference_url http://rhn.redhat.com/errata/RHSA-2016-2138.html
reference_id RHSA-2016-2138.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2138.html
29
reference_url https://access.redhat.com/errata/RHSA-2016:2658
reference_id RHSA-2016:2658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2658
30
reference_url http://rhn.redhat.com/errata/RHSA-2016-2658.html
reference_id RHSA-2016-2658.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2658.html
31
reference_url https://access.redhat.com/errata/RHSA-2016:2659
reference_id RHSA-2016:2659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2659
32
reference_url http://rhn.redhat.com/errata/RHSA-2016-2659.html
reference_id RHSA-2016-2659.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2016-2659.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0061
reference_id RHSA-2017:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0061
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0061.html
reference_id RHSA-2017-0061.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://rhn.redhat.com/errata/RHSA-2017-0061.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url https://access.redhat.com/errata/RHSA-2017:1216
36
reference_url https://usn.ubuntu.com/3121-1/
reference_id USN-3121-1
reference_type
scores
url https://usn.ubuntu.com/3121-1/
37
reference_url https://usn.ubuntu.com/3130-1/
reference_id USN-3130-1
reference_type
scores
url https://usn.ubuntu.com/3130-1/
38
reference_url http://www.ubuntu.com/usn/USN-3130-1
reference_id USN-3130-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://www.ubuntu.com/usn/USN-3130-1
39
reference_url https://usn.ubuntu.com/3154-1/
reference_id USN-3154-1
reference_type
scores
url https://usn.ubuntu.com/3154-1/
40
reference_url http://www.ubuntu.com/usn/USN-3154-1
reference_id USN-3154-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/
url http://www.ubuntu.com/usn/USN-3154-1
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5554
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd
33
url VCID-b731-snhn-jugu
vulnerability_id VCID-b731-snhn-jugu
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10198
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56375
published_at 2026-04-09T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56316
published_at 2026-04-02T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56361
published_at 2026-04-12T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56385
published_at 2026-04-11T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56206
published_at 2026-04-01T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56338
published_at 2026-04-04T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56319
published_at 2026-04-07T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.5637
published_at 2026-04-08T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56344
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472320
reference_id 1472320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472320
29
reference_url http://www.securityfocus.com/bid/99818
reference_id 99818
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.securityfocus.com/bid/99818
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:3392
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10198
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b731-snhn-jugu
34
url VCID-bg39-wvte-83c1
vulnerability_id VCID-bg39-wvte-83c1
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10349.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10349
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10349
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101348
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url http://www.securityfocus.com/bid/101348
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502611
reference_id 1502611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502611
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10349
reference_id CVE-2017-10349
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10349
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3264
87
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3267
88
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3268
89
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3392
90
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/
url https://access.redhat.com/errata/RHSA-2017:3453
91
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
92
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10349
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg39-wvte-83c1
35
url VCID-bthw-frhn-wqf6
vulnerability_id VCID-bthw-frhn-wqf6
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
reference_id 1471670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
29
reference_url http://www.securityfocus.com/bid/99847
reference_id 99847
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securityfocus.com/bid/99847
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10109
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bthw-frhn-wqf6
36
url VCID-c7sa-v6cu-d3ex
vulnerability_id VCID-c7sa-v6cu-d3ex
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5547
reference_id
reference_type
scores
0
value 0.01256
scoring_system epss
scoring_elements 0.79337
published_at 2026-04-02T12:55:00Z
1
value 0.01256
scoring_system epss
scoring_elements 0.79378
published_at 2026-04-13T12:55:00Z
2
value 0.01256
scoring_system epss
scoring_elements 0.7939
published_at 2026-04-12T12:55:00Z
3
value 0.01256
scoring_system epss
scoring_elements 0.79405
published_at 2026-04-11T12:55:00Z
4
value 0.01256
scoring_system epss
scoring_elements 0.79382
published_at 2026-04-09T12:55:00Z
5
value 0.01256
scoring_system epss
scoring_elements 0.79373
published_at 2026-04-08T12:55:00Z
6
value 0.01256
scoring_system epss
scoring_elements 0.79346
published_at 2026-04-07T12:55:00Z
7
value 0.01256
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-01T12:55:00Z
8
value 0.01256
scoring_system epss
scoring_elements 0.7936
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5547
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413764
reference_id 1413764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413764
17
reference_url http://www.securityfocus.com/bid/95521
reference_id 95521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://www.securityfocus.com/bid/95521
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/
url https://access.redhat.com/errata/RHSA-2017:1216
38
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
39
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5547
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex
37
url VCID-c9qw-1g2p-qqcr
vulnerability_id VCID-c9qw-1g2p-qqcr
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3544
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59471
published_at 2026-04-13T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-01T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59432
published_at 2026-04-02T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59457
published_at 2026-04-04T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59423
published_at 2026-04-07T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59474
published_at 2026-04-08T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-09T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-11T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://source.android.com/security/bulletin/2017-07-01
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://source.android.com/security/bulletin/2017-07-01
10
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url http://www.debian.org/security/2017/dsa-3858
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
12
reference_url http://www.securityfocus.com/bid/97745
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url http://www.securityfocus.com/bid/97745
13
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url http://www.securitytracker.com/id/1038286
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443068
reference_id 1443068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443068
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3544
reference_id CVE-2017-3544
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3544
49
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://security.gentoo.org/glsa/201705-03
50
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://security.gentoo.org/glsa/201707-01
51
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1108
52
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1109
53
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1117
54
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1118
55
reference_url https://access.redhat.com/errata/RHSA-2017:1119
reference_id RHSA-2017:1119
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1119
56
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1204
57
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1220
58
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1221
59
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:1222
60
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/
url https://access.redhat.com/errata/RHSA-2017:3453
61
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
62
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3544
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9qw-1g2p-qqcr
38
url VCID-cp95-73tk-2qhc
vulnerability_id VCID-cp95-73tk-2qhc
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1776.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://rhn.redhat.com/errata/RHSA-2016-1776.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3458
reference_id
reference_type
scores
0
value 0.02572
scoring_system epss
scoring_elements 0.85476
published_at 2026-04-01T12:55:00Z
1
value 0.02572
scoring_system epss
scoring_elements 0.85547
published_at 2026-04-13T12:55:00Z
2
value 0.02572
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-12T12:55:00Z
3
value 0.02572
scoring_system epss
scoring_elements 0.85552
published_at 2026-04-11T12:55:00Z
4
value 0.02572
scoring_system epss
scoring_elements 0.85538
published_at 2026-04-09T12:55:00Z
5
value 0.02572
scoring_system epss
scoring_elements 0.85528
published_at 2026-04-08T12:55:00Z
6
value 0.02572
scoring_system epss
scoring_elements 0.85508
published_at 2026-04-07T12:55:00Z
7
value 0.02572
scoring_system epss
scoring_elements 0.85504
published_at 2026-04-04T12:55:00Z
8
value 0.02572
scoring_system epss
scoring_elements 0.85488
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3458
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
20
reference_url http://www.debian.org/security/2016/dsa-3641
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.debian.org/security/2016/dsa-3641
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
22
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
23
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.securityfocus.com/bid/91787
24
reference_url http://www.securityfocus.com/bid/91945
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.securityfocus.com/bid/91945
25
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.securitytracker.com/id/1036365
26
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.ubuntu.com/usn/USN-3043-1
27
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.ubuntu.com/usn/USN-3062-1
28
reference_url http://www.ubuntu.com/usn/USN-3077-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url http://www.ubuntu.com/usn/USN-3077-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1357494
reference_id 1357494
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1357494
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3458
reference_id CVE-2016-3458
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3458
40
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://security.gentoo.org/glsa/201610-08
41
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://security.gentoo.org/glsa/201701-43
42
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://access.redhat.com/errata/RHSA-2016:1458
43
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://access.redhat.com/errata/RHSA-2016:1475
44
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://access.redhat.com/errata/RHSA-2016:1476
45
reference_url https://access.redhat.com/errata/RHSA-2016:1477
reference_id RHSA-2016:1477
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/
url https://access.redhat.com/errata/RHSA-2016:1477
46
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
47
reference_url https://access.redhat.com/errata/RHSA-2016:1776
reference_id RHSA-2016:1776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1776
48
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
49
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
50
reference_url https://usn.ubuntu.com/3077-1/
reference_id USN-3077-1
reference_type
scores
url https://usn.ubuntu.com/3077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3458
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cp95-73tk-2qhc
39
url VCID-ctd4-2fps-3bfk
vulnerability_id VCID-ctd4-2fps-3bfk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10118
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-12T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73152
published_at 2026-04-01T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73162
published_at 2026-04-02T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73183
published_at 2026-04-04T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73157
published_at 2026-04-07T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73193
published_at 2026-04-08T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73207
published_at 2026-04-13T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73232
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10118
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472470
reference_id 1472470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472470
29
reference_url http://www.securityfocus.com/bid/99782
reference_id 99782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.securityfocus.com/bid/99782
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
37
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
38
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10118
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctd4-2fps-3bfk
40
url VCID-d4gw-vgm6-qbf3
vulnerability_id VCID-d4gw-vgm6-qbf3
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
reference_id 1471266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
29
reference_url http://www.securityfocus.com/bid/99719
reference_id 99719
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securityfocus.com/bid/99719
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10107
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4gw-vgm6-qbf3
41
url VCID-db1c-8scn-buet
vulnerability_id VCID-db1c-8scn-buet
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2633
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.71846
published_at 2026-04-04T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.71818
published_at 2026-04-01T12:55:00Z
2
value 0.00693
scoring_system epss
scoring_elements 0.71819
published_at 2026-04-07T12:55:00Z
3
value 0.00693
scoring_system epss
scoring_elements 0.71858
published_at 2026-04-08T12:55:00Z
4
value 0.00693
scoring_system epss
scoring_elements 0.71869
published_at 2026-04-09T12:55:00Z
5
value 0.00693
scoring_system epss
scoring_elements 0.71893
published_at 2026-04-11T12:55:00Z
6
value 0.00693
scoring_system epss
scoring_elements 0.71875
published_at 2026-04-12T12:55:00Z
7
value 0.00693
scoring_system epss
scoring_elements 0.71827
published_at 2026-04-02T12:55:00Z
8
value 0.0083
scoring_system epss
scoring_elements 0.7453
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2633
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102557
reference_id 102557
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url http://www.securityfocus.com/bid/102557
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535036
reference_id 1535036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535036
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2633
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db1c-8scn-buet
42
url VCID-dtcg-vqnh-kugk
vulnerability_id VCID-dtcg-vqnh-kugk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66309
published_at 2026-04-13T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-01T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-02T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66302
published_at 2026-04-04T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66272
published_at 2026-04-07T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.6632
published_at 2026-04-08T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66333
published_at 2026-04-09T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66353
published_at 2026-04-11T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.6634
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securitytracker.com/id/1038931
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
reference_id 1471851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
28
reference_url http://www.securityfocus.com/bid/99774
reference_id 99774
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securityfocus.com/bid/99774
29
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3919
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
44
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10115
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtcg-vqnh-kugk
43
url VCID-e2zb-3859-qfe6
vulnerability_id VCID-e2zb-3859-qfe6
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5546
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78586
published_at 2026-04-13T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78536
published_at 2026-04-01T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78543
published_at 2026-04-02T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78573
published_at 2026-04-04T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78556
published_at 2026-04-07T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.78582
published_at 2026-04-08T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78588
published_at 2026-04-09T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-11T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78594
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413911
reference_id 1413911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413911
17
reference_url http://www.securityfocus.com/bid/95506
reference_id 95506
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://www.securityfocus.com/bid/95506
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5546
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6
44
url VCID-e8nm-ey3v-pfga
vulnerability_id VCID-e8nm-ey3v-pfga
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1776.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://rhn.redhat.com/errata/RHSA-2016-1776.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3550
reference_id
reference_type
scores
0
value 0.01909
scoring_system epss
scoring_elements 0.83213
published_at 2026-04-01T12:55:00Z
1
value 0.01909
scoring_system epss
scoring_elements 0.83282
published_at 2026-04-13T12:55:00Z
2
value 0.01909
scoring_system epss
scoring_elements 0.83286
published_at 2026-04-12T12:55:00Z
3
value 0.01909
scoring_system epss
scoring_elements 0.83292
published_at 2026-04-11T12:55:00Z
4
value 0.01909
scoring_system epss
scoring_elements 0.83276
published_at 2026-04-09T12:55:00Z
5
value 0.01909
scoring_system epss
scoring_elements 0.83267
published_at 2026-04-08T12:55:00Z
6
value 0.01909
scoring_system epss
scoring_elements 0.83243
published_at 2026-04-07T12:55:00Z
7
value 0.01909
scoring_system epss
scoring_elements 0.83244
published_at 2026-04-04T12:55:00Z
8
value 0.01909
scoring_system epss
scoring_elements 0.83229
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3550
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
20
reference_url http://www.debian.org/security/2016/dsa-3641
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.debian.org/security/2016/dsa-3641
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
22
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
23
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.securityfocus.com/bid/91787
24
reference_url http://www.securityfocus.com/bid/91951
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.securityfocus.com/bid/91951
25
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.securitytracker.com/id/1036365
26
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.ubuntu.com/usn/USN-3043-1
27
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.ubuntu.com/usn/USN-3062-1
28
reference_url http://www.ubuntu.com/usn/USN-3077-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url http://www.ubuntu.com/usn/USN-3077-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1357506
reference_id 1357506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1357506
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3550
reference_id CVE-2016-3550
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3550
42
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://security.gentoo.org/glsa/201610-08
43
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://security.gentoo.org/glsa/201701-43
44
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://access.redhat.com/errata/RHSA-2016:1458
45
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://access.redhat.com/errata/RHSA-2016:1475
46
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://access.redhat.com/errata/RHSA-2016:1476
47
reference_url https://access.redhat.com/errata/RHSA-2016:1477
reference_id RHSA-2016:1477
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/
url https://access.redhat.com/errata/RHSA-2016:1477
48
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
49
reference_url https://access.redhat.com/errata/RHSA-2016:1776
reference_id RHSA-2016:1776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1776
50
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
51
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
52
reference_url https://usn.ubuntu.com/3077-1/
reference_id USN-3077-1
reference_type
scores
url https://usn.ubuntu.com/3077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3550
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8nm-ey3v-pfga
45
url VCID-ejfg-8n1t-53b9
vulnerability_id VCID-ejfg-8n1t-53b9
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0675.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0675.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0676.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0676.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0723.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0723.html
15
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0695.json
16
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0695
reference_id
reference_type
scores
0
value 0.02922
scoring_system epss
scoring_elements 0.8633
published_at 2026-04-01T12:55:00Z
1
value 0.02922
scoring_system epss
scoring_elements 0.8634
published_at 2026-04-02T12:55:00Z
2
value 0.02922
scoring_system epss
scoring_elements 0.86358
published_at 2026-04-04T12:55:00Z
3
value 0.02922
scoring_system epss
scoring_elements 0.8636
published_at 2026-04-07T12:55:00Z
4
value 0.02922
scoring_system epss
scoring_elements 0.86378
published_at 2026-04-08T12:55:00Z
5
value 0.02922
scoring_system epss
scoring_elements 0.86388
published_at 2026-04-09T12:55:00Z
6
value 0.02922
scoring_system epss
scoring_elements 0.86401
published_at 2026-04-11T12:55:00Z
7
value 0.02922
scoring_system epss
scoring_elements 0.864
published_at 2026-04-12T12:55:00Z
8
value 0.02922
scoring_system epss
scoring_elements 0.86395
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0695
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
26
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
27
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.debian.org/security/2016/dsa-3558
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/86438
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.securityfocus.com/bid/86438
31
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.securitytracker.com/id/1035596
32
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.ubuntu.com/usn/USN-2963-1
33
reference_url http://www.ubuntu.com/usn/USN-2964-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.ubuntu.com/usn/USN-2964-1
34
reference_url http://www.ubuntu.com/usn/USN-2972-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url http://www.ubuntu.com/usn/USN-2972-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328022
reference_id 1328022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328022
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0695
reference_id CVE-2016-0695
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0695
62
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/
url https://security.gentoo.org/glsa/201606-18
63
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
64
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
65
reference_url https://access.redhat.com/errata/RHSA-2016:0675
reference_id RHSA-2016:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0675
66
reference_url https://access.redhat.com/errata/RHSA-2016:0676
reference_id RHSA-2016:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0676
67
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
68
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
69
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
70
reference_url https://access.redhat.com/errata/RHSA-2016:0723
reference_id RHSA-2016:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0723
71
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
72
reference_url https://usn.ubuntu.com/2964-1/
reference_id USN-2964-1
reference_type
scores
url https://usn.ubuntu.com/2964-1/
73
reference_url https://usn.ubuntu.com/2972-1/
reference_id USN-2972-1
reference_type
scores
url https://usn.ubuntu.com/2972-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0695
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejfg-8n1t-53b9
46
url VCID-enkm-4xpy-6bfp
vulnerability_id VCID-enkm-4xpy-6bfp
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2815.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2815
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.71876
published_at 2026-04-12T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.71819
published_at 2026-04-01T12:55:00Z
2
value 0.00693
scoring_system epss
scoring_elements 0.71828
published_at 2026-04-02T12:55:00Z
3
value 0.00693
scoring_system epss
scoring_elements 0.71847
published_at 2026-04-04T12:55:00Z
4
value 0.00693
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-07T12:55:00Z
5
value 0.00693
scoring_system epss
scoring_elements 0.71859
published_at 2026-04-13T12:55:00Z
6
value 0.00693
scoring_system epss
scoring_elements 0.7187
published_at 2026-04-09T12:55:00Z
7
value 0.00693
scoring_system epss
scoring_elements 0.71894
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103848
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url http://www.securityfocus.com/bid/103848
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567537
reference_id 1567537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567537
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2815
reference_id CVE-2018-2815
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2815
50
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://security.gentoo.org/glsa/201903-14
51
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1188
52
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1191
53
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1201
54
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1202
55
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1203
56
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1204
57
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1205
58
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1206
59
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1270
60
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://access.redhat.com/errata/RHSA-2018:1278
61
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://usn.ubuntu.com/3644-1/
62
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2815
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enkm-4xpy-6bfp
47
url VCID-fsu1-jy1q-qkh1
vulnerability_id VCID-fsu1-jy1q-qkh1
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3539
reference_id
reference_type
scores
0
value 0.00731
scoring_system epss
scoring_elements 0.72681
published_at 2026-04-13T12:55:00Z
1
value 0.00731
scoring_system epss
scoring_elements 0.7263
published_at 2026-04-01T12:55:00Z
2
value 0.00731
scoring_system epss
scoring_elements 0.72638
published_at 2026-04-02T12:55:00Z
3
value 0.00731
scoring_system epss
scoring_elements 0.72655
published_at 2026-04-04T12:55:00Z
4
value 0.00731
scoring_system epss
scoring_elements 0.72632
published_at 2026-04-07T12:55:00Z
5
value 0.00731
scoring_system epss
scoring_elements 0.72672
published_at 2026-04-08T12:55:00Z
6
value 0.00731
scoring_system epss
scoring_elements 0.72685
published_at 2026-04-09T12:55:00Z
7
value 0.00731
scoring_system epss
scoring_elements 0.72708
published_at 2026-04-11T12:55:00Z
8
value 0.00731
scoring_system epss
scoring_elements 0.72691
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3539
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url http://www.debian.org/security/2017/dsa-3858
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
11
reference_url http://www.securityfocus.com/bid/97752
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url http://www.securityfocus.com/bid/97752
12
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url http://www.securitytracker.com/id/1038286
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443097
reference_id 1443097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443097
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3539
reference_id CVE-2017-3539
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3539
39
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://security.gentoo.org/glsa/201705-03
40
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://security.gentoo.org/glsa/201707-01
41
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1108
42
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1109
43
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1117
44
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1118
45
reference_url https://access.redhat.com/errata/RHSA-2017:1119
reference_id RHSA-2017:1119
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1119
46
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1204
47
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1220
48
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1221
49
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:1222
50
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/
url https://access.redhat.com/errata/RHSA-2017:3453
51
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
52
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3539
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsu1-jy1q-qkh1
48
url VCID-ft81-49v3-a7cr
vulnerability_id VCID-ft81-49v3-a7cr
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3533
reference_id
reference_type
scores
0
value 0.00648
scoring_system epss
scoring_elements 0.70782
published_at 2026-04-13T12:55:00Z
1
value 0.00648
scoring_system epss
scoring_elements 0.70721
published_at 2026-04-01T12:55:00Z
2
value 0.00648
scoring_system epss
scoring_elements 0.70737
published_at 2026-04-02T12:55:00Z
3
value 0.00648
scoring_system epss
scoring_elements 0.70755
published_at 2026-04-04T12:55:00Z
4
value 0.00648
scoring_system epss
scoring_elements 0.7073
published_at 2026-04-07T12:55:00Z
5
value 0.00648
scoring_system epss
scoring_elements 0.70775
published_at 2026-04-08T12:55:00Z
6
value 0.00648
scoring_system epss
scoring_elements 0.70791
published_at 2026-04-09T12:55:00Z
7
value 0.00648
scoring_system epss
scoring_elements 0.70813
published_at 2026-04-11T12:55:00Z
8
value 0.00648
scoring_system epss
scoring_elements 0.70798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url http://www.debian.org/security/2017/dsa-3858
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
11
reference_url http://www.securityfocus.com/bid/97740
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url http://www.securityfocus.com/bid/97740
12
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url http://www.securitytracker.com/id/1038286
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443083
reference_id 1443083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443083
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3533
reference_id CVE-2017-3533
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3533
40
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://security.gentoo.org/glsa/201705-03
41
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://security.gentoo.org/glsa/201707-01
42
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1108
43
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1109
44
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1117
45
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1118
46
reference_url https://access.redhat.com/errata/RHSA-2017:1119
reference_id RHSA-2017:1119
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1119
47
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1204
48
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1220
49
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1221
50
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:1222
51
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/
url https://access.redhat.com/errata/RHSA-2017:3453
52
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
53
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3533
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ft81-49v3-a7cr
49
url VCID-ftnn-eurn-wydw
vulnerability_id VCID-ftnn-eurn-wydw
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3261
reference_id
reference_type
scores
0
value 0.00857
scoring_system epss
scoring_elements 0.74937
published_at 2026-04-01T12:55:00Z
1
value 0.00857
scoring_system epss
scoring_elements 0.74981
published_at 2026-04-13T12:55:00Z
2
value 0.00857
scoring_system epss
scoring_elements 0.74991
published_at 2026-04-12T12:55:00Z
3
value 0.00857
scoring_system epss
scoring_elements 0.75012
published_at 2026-04-11T12:55:00Z
4
value 0.00857
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-09T12:55:00Z
5
value 0.00857
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-08T12:55:00Z
6
value 0.00857
scoring_system epss
scoring_elements 0.7494
published_at 2026-04-02T12:55:00Z
7
value 0.00857
scoring_system epss
scoring_elements 0.74943
published_at 2026-04-07T12:55:00Z
8
value 0.00857
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3261
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413653
reference_id 1413653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413653
17
reference_url http://www.securityfocus.com/bid/95566
reference_id 95566
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://www.securityfocus.com/bid/95566
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3261
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw
50
url VCID-gceb-nxww-w3f5
vulnerability_id VCID-gceb-nxww-w3f5
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2796.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2796
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52552
published_at 2026-04-07T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52617
published_at 2026-04-13T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52631
published_at 2026-04-12T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52648
published_at 2026-04-11T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52585
published_at 2026-04-04T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52558
published_at 2026-04-02T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52512
published_at 2026-04-01T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-09T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52603
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103868
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.securityfocus.com/bid/103868
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567546
reference_id 1567546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567546
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2796
reference_id CVE-2018-2796
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2796
51
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://security.gentoo.org/glsa/201903-14
52
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1188
53
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1191
54
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1201
55
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1202
56
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1204
57
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1206
58
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1270
59
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1278
60
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1721
61
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1722
62
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1723
63
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1724
64
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1974
65
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://access.redhat.com/errata/RHSA-2018:1975
66
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://usn.ubuntu.com/3644-1/
67
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2796
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gceb-nxww-w3f5
51
url VCID-gfk8-e7xe-17fk
vulnerability_id VCID-gfk8-e7xe-17fk
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2629.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2629
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44529
published_at 2026-04-02T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44532
published_at 2026-04-13T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.4453
published_at 2026-04-12T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44561
published_at 2026-04-11T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44544
published_at 2026-04-09T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44539
published_at 2026-04-08T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44488
published_at 2026-04-07T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.4455
published_at 2026-04-04T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44459
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102615
reference_id 102615
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url http://www.securityfocus.com/bid/102615
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534625
reference_id 1534625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534625
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:1463
33
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://access.redhat.com/errata/RHSA-2018:1812
34
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://usn.ubuntu.com/3613-1/
35
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2629
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfk8-e7xe-17fk
52
url VCID-gted-bme5-r7gf
vulnerability_id VCID-gted-bme5-r7gf
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0494
reference_id
reference_type
scores
0
value 0.0867
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-13T12:55:00Z
1
value 0.0867
scoring_system epss
scoring_elements 0.92463
published_at 2026-04-12T12:55:00Z
2
value 0.0867
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-01T12:55:00Z
3
value 0.0867
scoring_system epss
scoring_elements 0.92426
published_at 2026-04-02T12:55:00Z
4
value 0.0867
scoring_system epss
scoring_elements 0.92435
published_at 2026-04-04T12:55:00Z
5
value 0.0867
scoring_system epss
scoring_elements 0.92437
published_at 2026-04-07T12:55:00Z
6
value 0.0867
scoring_system epss
scoring_elements 0.92449
published_at 2026-04-08T12:55:00Z
7
value 0.0867
scoring_system epss
scoring_elements 0.92454
published_at 2026-04-09T12:55:00Z
8
value 0.0867
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0494
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
44
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
45
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
46
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
47
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
48
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
49
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
50
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
51
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298906
reference_id 1298906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298906
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0494
reference_id CVE-2016-0494
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0494
64
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
65
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
66
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
67
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
68
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
69
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
70
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
71
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
72
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
73
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
74
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
75
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
76
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
77
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
78
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
79
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
80
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
81
reference_url https://usn.ubuntu.com/3227-1/
reference_id USN-3227-1
reference_type
scores
url https://usn.ubuntu.com/3227-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0494
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf
53
url VCID-htzk-vgn5-m7ak
vulnerability_id VCID-htzk-vgn5-m7ak
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2663
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21184
published_at 2026-04-13T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21166
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21374
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21207
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21268
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21278
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102662
reference_id 102662
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url http://www.securityfocus.com/bid/102662
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534296
reference_id 1534296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534296
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2663
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htzk-vgn5-m7ak
54
url VCID-hvzr-km7c-cqgz
vulnerability_id VCID-hvzr-km7c-cqgz
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3260
reference_id
reference_type
scores
0
value 0.01903
scoring_system epss
scoring_elements 0.83177
published_at 2026-04-01T12:55:00Z
1
value 0.01903
scoring_system epss
scoring_elements 0.83193
published_at 2026-04-02T12:55:00Z
2
value 0.01903
scoring_system epss
scoring_elements 0.83243
published_at 2026-04-13T12:55:00Z
3
value 0.01903
scoring_system epss
scoring_elements 0.83207
published_at 2026-04-04T12:55:00Z
4
value 0.01903
scoring_system epss
scoring_elements 0.83206
published_at 2026-04-07T12:55:00Z
5
value 0.01903
scoring_system epss
scoring_elements 0.83231
published_at 2026-04-08T12:55:00Z
6
value 0.01903
scoring_system epss
scoring_elements 0.83238
published_at 2026-04-09T12:55:00Z
7
value 0.01903
scoring_system epss
scoring_elements 0.83253
published_at 2026-04-11T12:55:00Z
8
value 0.01903
scoring_system epss
scoring_elements 0.83247
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3260
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414562
reference_id 1414562
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414562
17
reference_url http://www.securityfocus.com/bid/95576
reference_id 95576
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url http://www.securityfocus.com/bid/95576
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3260
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvzr-km7c-cqgz
55
url VCID-hxb8-qu7h-8bdu
vulnerability_id VCID-hxb8-qu7h-8bdu
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
reference_id 1471521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
29
reference_url http://www.securityfocus.com/bid/99703
reference_id 99703
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securityfocus.com/bid/99703
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10087
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxb8-qu7h-8bdu
56
url VCID-j5hg-xy6j-rkgv
vulnerability_id VCID-j5hg-xy6j-rkgv
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10193
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65714
published_at 2026-04-13T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65629
published_at 2026-04-01T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65678
published_at 2026-04-02T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65708
published_at 2026-04-04T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65674
published_at 2026-04-07T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65725
published_at 2026-04-08T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65737
published_at 2026-04-09T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65758
published_at 2026-04-11T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65744
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471715
reference_id 1471715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471715
29
reference_url http://www.securityfocus.com/bid/99854
reference_id 99854
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.securityfocus.com/bid/99854
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:3392
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10193
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5hg-xy6j-rkgv
57
url VCID-jccp-8k75-xkhn
vulnerability_id VCID-jccp-8k75-xkhn
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0675.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0675.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0676.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0676.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-0723.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-0723.html
27
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
28
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json
29
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3427
reference_id
reference_type
scores
0
value 0.94019
scoring_system epss
scoring_elements 0.99896
published_at 2026-04-04T12:55:00Z
1
value 0.94019
scoring_system epss
scoring_elements 0.99898
published_at 2026-04-13T12:55:00Z
2
value 0.94019
scoring_system epss
scoring_elements 0.99897
published_at 2026-04-12T12:55:00Z
3
value 0.94019
scoring_system epss
scoring_elements 0.99895
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3427
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
37
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
38
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
39
reference_url https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
40
reference_url https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
52
reference_url https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E
53
reference_url https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
54
reference_url https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E
55
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
56
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427
57
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.debian.org/security/2016/dsa-3558
58
reference_url http://www.openwall.com/lists/oss-security/2020/08/31/1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.openwall.com/lists/oss-security/2020/08/31/1
59
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
60
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
61
reference_url http://www.securityfocus.com/bid/86421
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.securityfocus.com/bid/86421
62
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.securitytracker.com/id/1035596
63
reference_url http://www.securitytracker.com/id/1037331
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.securitytracker.com/id/1037331
64
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.ubuntu.com/usn/USN-2963-1
65
reference_url http://www.ubuntu.com/usn/USN-2964-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.ubuntu.com/usn/USN-2964-1
66
reference_url http://www.ubuntu.com/usn/USN-2972-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url http://www.ubuntu.com/usn/USN-2972-1
67
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328210
reference_id 1328210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328210
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3427
reference_id CVE-2016-3427
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3427
147
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://security.gentoo.org/glsa/201606-18
148
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
149
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
150
reference_url https://access.redhat.com/errata/RHSA-2016:0675
reference_id RHSA-2016:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0675
151
reference_url https://access.redhat.com/errata/RHSA-2016:0676
reference_id RHSA-2016:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0676
152
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
153
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
154
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
155
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
156
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
157
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
158
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
159
reference_url https://access.redhat.com/errata/RHSA-2016:0723
reference_id RHSA-2016:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0723
160
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
161
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://access.redhat.com/errata/RHSA-2016:1430
162
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/
url https://access.redhat.com/errata/RHSA-2017:1216
163
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
164
reference_url https://usn.ubuntu.com/2964-1/
reference_id USN-2964-1
reference_type
scores
url https://usn.ubuntu.com/2964-1/
165
reference_url https://usn.ubuntu.com/2972-1/
reference_id USN-2972-1
reference_type
scores
url https://usn.ubuntu.com/2972-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3427
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jccp-8k75-xkhn
58
url VCID-jh9n-h2qn-pqh3
vulnerability_id VCID-jh9n-h2qn-pqh3
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2790.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2790
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46958
published_at 2026-04-13T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46901
published_at 2026-04-01T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46937
published_at 2026-04-02T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46954
published_at 2026-04-04T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46902
published_at 2026-04-07T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46956
published_at 2026-04-08T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46953
published_at 2026-04-09T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46977
published_at 2026-04-11T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46951
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2790
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
13
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
14
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
16
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://www.debian.org/security/2018/dsa-4185
17
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://www.debian.org/security/2018/dsa-4225
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
19
reference_url http://www.securityfocus.com/bid/103877
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url http://www.securityfocus.com/bid/103877
20
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url http://www.securitytracker.com/id/1040697
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568515
reference_id 1568515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568515
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2790
reference_id CVE-2018-2790
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2790
51
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://security.gentoo.org/glsa/201903-14
52
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1188
53
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1191
54
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1201
55
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1202
56
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1203
57
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1204
58
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1205
59
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1206
60
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1270
61
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1278
62
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1721
63
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1722
64
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1723
65
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1724
66
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1974
67
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://access.redhat.com/errata/RHSA-2018:1975
68
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://usn.ubuntu.com/3644-1/
69
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2790
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jh9n-h2qn-pqh3
59
url VCID-jj9j-kwv8-byba
vulnerability_id VCID-jj9j-kwv8-byba
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0466
reference_id
reference_type
scores
0
value 0.04977
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-13T12:55:00Z
1
value 0.04977
scoring_system epss
scoring_elements 0.89696
published_at 2026-04-12T12:55:00Z
2
value 0.04977
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-01T12:55:00Z
3
value 0.04977
scoring_system epss
scoring_elements 0.89651
published_at 2026-04-02T12:55:00Z
4
value 0.04977
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-04T12:55:00Z
5
value 0.04977
scoring_system epss
scoring_elements 0.89668
published_at 2026-04-07T12:55:00Z
6
value 0.04977
scoring_system epss
scoring_elements 0.89684
published_at 2026-04-08T12:55:00Z
7
value 0.04977
scoring_system epss
scoring_elements 0.8969
published_at 2026-04-09T12:55:00Z
8
value 0.04977
scoring_system epss
scoring_elements 0.89698
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0466
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
42
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
43
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
44
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
46
reference_url http://www.securityfocus.com/bid/81118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81118
47
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
48
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
49
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
50
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299385
reference_id 1299385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299385
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0466
reference_id CVE-2016-0466
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0466
62
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
63
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
64
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
65
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
66
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
67
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
68
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
69
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
70
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
71
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
72
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
73
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
74
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
75
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
76
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
77
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
78
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0466
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba
60
url VCID-k3pa-xdxn-ubbg
vulnerability_id VCID-k3pa-xdxn-ubbg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3231
reference_id
reference_type
scores
0
value 0.00593
scoring_system epss
scoring_elements 0.69191
published_at 2026-04-01T12:55:00Z
1
value 0.00593
scoring_system epss
scoring_elements 0.69256
published_at 2026-04-13T12:55:00Z
2
value 0.00593
scoring_system epss
scoring_elements 0.69285
published_at 2026-04-12T12:55:00Z
3
value 0.00593
scoring_system epss
scoring_elements 0.693
published_at 2026-04-11T12:55:00Z
4
value 0.00593
scoring_system epss
scoring_elements 0.69278
published_at 2026-04-09T12:55:00Z
5
value 0.00593
scoring_system epss
scoring_elements 0.69259
published_at 2026-04-08T12:55:00Z
6
value 0.00593
scoring_system epss
scoring_elements 0.69207
published_at 2026-04-02T12:55:00Z
7
value 0.00593
scoring_system epss
scoring_elements 0.69209
published_at 2026-04-07T12:55:00Z
8
value 0.00593
scoring_system epss
scoring_elements 0.69227
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413717
reference_id 1413717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413717
17
reference_url http://www.securityfocus.com/bid/95563
reference_id 95563
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://www.securityfocus.com/bid/95563
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3231
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg
61
url VCID-k57c-bcn4-zbat
vulnerability_id VCID-k57c-bcn4-zbat
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2794.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2794
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14337
published_at 2026-04-07T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14374
published_at 2026-04-01T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14459
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14528
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14421
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14476
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14426
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14389
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19885
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103817
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url http://www.securityfocus.com/bid/103817
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567126
reference_id 1567126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567126
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2794
reference_id CVE-2018-2794
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2794
53
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://security.gentoo.org/glsa/201903-14
54
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1188
55
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1191
56
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1201
57
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1202
58
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1203
59
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1204
60
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1205
61
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1206
62
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1270
63
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1278
64
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1721
65
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1722
66
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1723
67
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1724
68
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1974
69
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://access.redhat.com/errata/RHSA-2018:1975
70
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://usn.ubuntu.com/3644-1/
71
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2794
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k57c-bcn4-zbat
62
url VCID-kejc-5261-t7c6
vulnerability_id VCID-kejc-5261-t7c6
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10281.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10281
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101378
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url http://www.securityfocus.com/bid/101378
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502649
reference_id 1502649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502649
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10281
reference_id CVE-2017-10281
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10281
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10281
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kejc-5261-t7c6
63
url VCID-kw91-zqtv-7kap
vulnerability_id VCID-kw91-zqtv-7kap
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2579
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29288
published_at 2026-04-04T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29114
published_at 2026-04-13T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29213
published_at 2026-04-11T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29238
published_at 2026-04-02T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29207
published_at 2026-04-09T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29167
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29163
published_at 2026-04-01T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29103
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2579
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102663
reference_id 102663
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url http://www.securityfocus.com/bid/102663
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534298
reference_id 1534298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534298
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2579
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw91-zqtv-7kap
64
url VCID-m84d-m2tw-tyet
vulnerability_id VCID-m84d-m2tw-tyet
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10348.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10348
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10348
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101354
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url http://www.securityfocus.com/bid/101354
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502629
reference_id 1502629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502629
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10348
reference_id CVE-2017-10348
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10348
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3264
87
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3267
88
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3268
89
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3392
90
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/
url https://access.redhat.com/errata/RHSA-2017:3453
91
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
92
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10348
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m84d-m2tw-tyet
65
url VCID-n1wv-bkbb-gugt
vulnerability_id VCID-n1wv-bkbb-gugt
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5573
reference_id
reference_type
scores
0
value 0.0284
scoring_system epss
scoring_elements 0.86201
published_at 2026-04-13T12:55:00Z
1
value 0.0284
scoring_system epss
scoring_elements 0.86136
published_at 2026-04-01T12:55:00Z
2
value 0.0284
scoring_system epss
scoring_elements 0.86147
published_at 2026-04-02T12:55:00Z
3
value 0.0284
scoring_system epss
scoring_elements 0.86162
published_at 2026-04-07T12:55:00Z
4
value 0.0284
scoring_system epss
scoring_elements 0.86181
published_at 2026-04-08T12:55:00Z
5
value 0.0284
scoring_system epss
scoring_elements 0.86193
published_at 2026-04-09T12:55:00Z
6
value 0.0284
scoring_system epss
scoring_elements 0.86207
published_at 2026-04-11T12:55:00Z
7
value 0.0284
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://www.securitytracker.com/id/1037040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1385544
reference_id 1385544
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1385544
10
reference_url http://www.securityfocus.com/bid/93628
reference_id 93628
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://www.securityfocus.com/bid/93628
11
reference_url http://www.debian.org/security/2016/dsa-3707
reference_id dsa-3707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://www.debian.org/security/2016/dsa-3707
12
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url https://security.gentoo.org/glsa/201611-04
13
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url https://security.gentoo.org/glsa/201701-43
14
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2016:2079
reference_id RHSA-2016:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2079
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-2079.html
reference_id RHSA-2016-2079.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2079.html
17
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2136
reference_id RHSA-2016:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2136
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-2136.html
reference_id RHSA-2016-2136.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2136.html
25
reference_url https://access.redhat.com/errata/RHSA-2016:2137
reference_id RHSA-2016:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2137
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-2137.html
reference_id RHSA-2016-2137.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2137.html
27
reference_url https://access.redhat.com/errata/RHSA-2016:2138
reference_id RHSA-2016:2138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2138
28
reference_url http://rhn.redhat.com/errata/RHSA-2016-2138.html
reference_id RHSA-2016-2138.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2138.html
29
reference_url https://access.redhat.com/errata/RHSA-2016:2658
reference_id RHSA-2016:2658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2658
30
reference_url http://rhn.redhat.com/errata/RHSA-2016-2658.html
reference_id RHSA-2016-2658.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2658.html
31
reference_url https://access.redhat.com/errata/RHSA-2016:2659
reference_id RHSA-2016:2659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2659
32
reference_url http://rhn.redhat.com/errata/RHSA-2016-2659.html
reference_id RHSA-2016-2659.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2016-2659.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0061
reference_id RHSA-2017:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0061
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0061.html
reference_id RHSA-2017-0061.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://rhn.redhat.com/errata/RHSA-2017-0061.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url https://access.redhat.com/errata/RHSA-2017:1216
36
reference_url https://usn.ubuntu.com/3121-1/
reference_id USN-3121-1
reference_type
scores
url https://usn.ubuntu.com/3121-1/
37
reference_url https://usn.ubuntu.com/3130-1/
reference_id USN-3130-1
reference_type
scores
url https://usn.ubuntu.com/3130-1/
38
reference_url http://www.ubuntu.com/usn/USN-3130-1
reference_id USN-3130-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://www.ubuntu.com/usn/USN-3130-1
39
reference_url https://usn.ubuntu.com/3154-1/
reference_id USN-3154-1
reference_type
scores
url https://usn.ubuntu.com/3154-1/
40
reference_url http://www.ubuntu.com/usn/USN-3154-1
reference_id USN-3154-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/
url http://www.ubuntu.com/usn/USN-3154-1
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5573
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt
66
url VCID-n46g-eb9y-9bds
vulnerability_id VCID-n46g-eb9y-9bds
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10350.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10350.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10350
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10350
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url http://www.securityfocus.com/bid/101341
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502640
reference_id 1502640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502640
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10350
reference_id CVE-2017-10350
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10350
78
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://security.gentoo.org/glsa/201710-31
79
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://security.gentoo.org/glsa/201711-14
80
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:2998
81
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:2999
82
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3046
83
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3264
84
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3267
85
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3268
86
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3392
87
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/
url https://access.redhat.com/errata/RHSA-2017:3453
88
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
89
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10350
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n46g-eb9y-9bds
67
url VCID-nwvg-gjkx-8khw
vulnerability_id VCID-nwvg-gjkx-8khw
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2798.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2798
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.394
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39585
published_at 2026-04-04T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-08T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39571
published_at 2026-04-09T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39581
published_at 2026-04-11T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39562
published_at 2026-04-02T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39543
published_at 2026-04-12T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39527
published_at 2026-04-13T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.395
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103841
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url http://www.securityfocus.com/bid/103841
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567543
reference_id 1567543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567543
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2798
reference_id CVE-2018-2798
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2798
53
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://security.gentoo.org/glsa/201903-14
54
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1188
55
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1191
56
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1201
57
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1202
58
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1203
59
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1204
60
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1205
61
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1206
62
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1270
63
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1278
64
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1721
65
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1722
66
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1723
67
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1724
68
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1974
69
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://access.redhat.com/errata/RHSA-2018:1975
70
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://usn.ubuntu.com/3644-1/
71
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2798
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwvg-gjkx-8khw
68
url VCID-pdv6-xmdk-d3hy
vulnerability_id VCID-pdv6-xmdk-d3hy
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10274.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10274
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69618
published_at 2026-04-02T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69604
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69633
published_at 2026-04-04T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69612
published_at 2026-04-07T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69663
published_at 2026-04-08T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.6968
published_at 2026-04-09T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69702
published_at 2026-04-11T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69687
published_at 2026-04-12T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69673
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:C/I:C/A:N
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
23
reference_url http://www.securityfocus.com/bid/101333
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url http://www.securityfocus.com/bid/101333
24
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url http://www.securitytracker.com/id/1039596
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502053
reference_id 1502053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502053
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10274
reference_id CVE-2017-10274
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10274
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/
url https://access.redhat.com/errata/RHSA-2017:3392
87
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
88
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10274
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdv6-xmdk-d3hy
69
url VCID-ps35-n8f5-uqcr
vulnerability_id VCID-ps35-n8f5-uqcr
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
reference_id 1471888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
29
reference_url http://www.securityfocus.com/bid/99846
reference_id 99846
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securityfocus.com/bid/99846
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10108
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ps35-n8f5-uqcr
70
url VCID-qfam-11ye-tkd8
vulnerability_id VCID-qfam-11ye-tkd8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
reference_id 1471523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
29
reference_url http://www.securityfocus.com/bid/99643
reference_id 99643
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securityfocus.com/bid/99643
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10110
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfam-11ye-tkd8
71
url VCID-qs1s-6yjm-jye5
vulnerability_id VCID-qs1s-6yjm-jye5
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5552
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.72038
published_at 2026-04-13T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-01T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.72
published_at 2026-04-02T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-04T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.71996
published_at 2026-04-07T12:55:00Z
5
value 0.00702
scoring_system epss
scoring_elements 0.72035
published_at 2026-04-08T12:55:00Z
6
value 0.00702
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-09T12:55:00Z
7
value 0.00702
scoring_system epss
scoring_elements 0.7207
published_at 2026-04-11T12:55:00Z
8
value 0.00702
scoring_system epss
scoring_elements 0.72054
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5552
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://www.securitytracker.com/id/1037637
16
reference_url http://www.securitytracker.com/id/1037798
reference_id 1037798
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://www.securitytracker.com/id/1037798
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413882
reference_id 1413882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413882
18
reference_url https://source.android.com/security/bulletin/2017-02-01.html
reference_id 2017-02-01.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url https://source.android.com/security/bulletin/2017-02-01.html
19
reference_url http://www.securityfocus.com/bid/95512
reference_id 95512
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://www.securityfocus.com/bid/95512
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
21
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://www.debian.org/security/2017/dsa-3782
22
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url https://security.gentoo.org/glsa/201701-65
23
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url https://security.gentoo.org/glsa/201707-01
24
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
25
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
42
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
43
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/
url https://access.redhat.com/errata/RHSA-2017:1216
44
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
45
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
46
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5552
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5
72
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
73
url VCID-r1ff-e1sf-eqeg
vulnerability_id VCID-r1ff-e1sf-eqeg
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1776.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1776.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3508
reference_id
reference_type
scores
0
value 0.0942
scoring_system epss
scoring_elements 0.92794
published_at 2026-04-13T12:55:00Z
1
value 0.0942
scoring_system epss
scoring_elements 0.92768
published_at 2026-04-01T12:55:00Z
2
value 0.0942
scoring_system epss
scoring_elements 0.92775
published_at 2026-04-02T12:55:00Z
3
value 0.0942
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-04T12:55:00Z
4
value 0.0942
scoring_system epss
scoring_elements 0.92777
published_at 2026-04-07T12:55:00Z
5
value 0.0942
scoring_system epss
scoring_elements 0.92786
published_at 2026-04-08T12:55:00Z
6
value 0.0942
scoring_system epss
scoring_elements 0.92791
published_at 2026-04-09T12:55:00Z
7
value 0.0942
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3508
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
20
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
21
reference_url http://www.debian.org/security/2016/dsa-3641
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.debian.org/security/2016/dsa-3641
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
23
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
24
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.securityfocus.com/bid/91787
25
reference_url http://www.securityfocus.com/bid/91972
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.securityfocus.com/bid/91972
26
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.securitytracker.com/id/1036365
27
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.ubuntu.com/usn/USN-3043-1
28
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.ubuntu.com/usn/USN-3062-1
29
reference_url http://www.ubuntu.com/usn/USN-3077-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url http://www.ubuntu.com/usn/USN-3077-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1357015
reference_id 1357015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1357015
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3508
reference_id CVE-2016-3508
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-3508
44
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://security.gentoo.org/glsa/201610-08
45
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://security.gentoo.org/glsa/201701-43
46
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://access.redhat.com/errata/RHSA-2016:1458
47
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://access.redhat.com/errata/RHSA-2016:1475
48
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://access.redhat.com/errata/RHSA-2016:1476
49
reference_url https://access.redhat.com/errata/RHSA-2016:1477
reference_id RHSA-2016:1477
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/
url https://access.redhat.com/errata/RHSA-2016:1477
50
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
51
reference_url https://access.redhat.com/errata/RHSA-2016:1776
reference_id RHSA-2016:1776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1776
52
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
53
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
54
reference_url https://usn.ubuntu.com/3077-1/
reference_id USN-3077-1
reference_type
scores
url https://usn.ubuntu.com/3077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3508
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ff-e1sf-eqeg
74
url VCID-r4tw-jgd7-euet
vulnerability_id VCID-r4tw-jgd7-euet
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2678
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-07T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21184
published_at 2026-04-13T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-12T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-02T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21278
published_at 2026-04-11T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21268
published_at 2026-04-09T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21166
published_at 2026-04-01T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21374
published_at 2026-04-04T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21207
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102659
reference_id 102659
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url http://www.securityfocus.com/bid/102659
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534263
reference_id 1534263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534263
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
25
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
26
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0095
27
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0099
28
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0100
29
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0115
30
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0349
31
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0351
32
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0352
33
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0458
34
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:0521
35
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:1463
36
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://access.redhat.com/errata/RHSA-2018:1812
37
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://usn.ubuntu.com/3613-1/
38
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2678
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4tw-jgd7-euet
75
url VCID-r7cu-ewk5-pygd
vulnerability_id VCID-r7cu-ewk5-pygd
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0675.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0675.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0676.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0676.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-0723.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-0723.html
27
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
28
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json
29
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0686
reference_id
reference_type
scores
0
value 0.05413
scoring_system epss
scoring_elements 0.90101
published_at 2026-04-01T12:55:00Z
1
value 0.05413
scoring_system epss
scoring_elements 0.90104
published_at 2026-04-02T12:55:00Z
2
value 0.05413
scoring_system epss
scoring_elements 0.90115
published_at 2026-04-04T12:55:00Z
3
value 0.05413
scoring_system epss
scoring_elements 0.9012
published_at 2026-04-07T12:55:00Z
4
value 0.05413
scoring_system epss
scoring_elements 0.90135
published_at 2026-04-08T12:55:00Z
5
value 0.05413
scoring_system epss
scoring_elements 0.90141
published_at 2026-04-09T12:55:00Z
6
value 0.05413
scoring_system epss
scoring_elements 0.9015
published_at 2026-04-11T12:55:00Z
7
value 0.05413
scoring_system epss
scoring_elements 0.90149
published_at 2026-04-12T12:55:00Z
8
value 0.05413
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0686
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
37
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
38
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
39
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.debian.org/security/2016/dsa-3558
40
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
41
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
42
reference_url http://www.securityfocus.com/bid/86473
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.securityfocus.com/bid/86473
43
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.securitytracker.com/id/1035596
44
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.ubuntu.com/usn/USN-2963-1
45
reference_url http://www.ubuntu.com/usn/USN-2964-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.ubuntu.com/usn/USN-2964-1
46
reference_url http://www.ubuntu.com/usn/USN-2972-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url http://www.ubuntu.com/usn/USN-2972-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327743
reference_id 1327743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327743
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0686
reference_id CVE-2016-0686
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0686
55
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url https://security.gentoo.org/glsa/201606-18
56
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
57
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
58
reference_url https://access.redhat.com/errata/RHSA-2016:0675
reference_id RHSA-2016:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0675
59
reference_url https://access.redhat.com/errata/RHSA-2016:0676
reference_id RHSA-2016:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0676
60
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
61
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
62
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
63
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
64
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
65
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
66
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
67
reference_url https://access.redhat.com/errata/RHSA-2016:0723
reference_id RHSA-2016:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0723
68
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
69
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url https://access.redhat.com/errata/RHSA-2016:1430
70
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/
url https://access.redhat.com/errata/RHSA-2017:1216
71
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
72
reference_url https://usn.ubuntu.com/2964-1/
reference_id USN-2964-1
reference_type
scores
url https://usn.ubuntu.com/2964-1/
73
reference_url https://usn.ubuntu.com/2972-1/
reference_id USN-2972-1
reference_type
scores
url https://usn.ubuntu.com/2972-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0686
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7cu-ewk5-pygd
76
url VCID-rf14-48vb-w7gh
vulnerability_id VCID-rf14-48vb-w7gh
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2797.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2797
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27931
published_at 2026-04-11T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27936
published_at 2026-04-01T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.2799
published_at 2026-04-02T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27822
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27889
published_at 2026-04-12T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.28031
published_at 2026-04-04T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.2793
published_at 2026-04-09T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39527
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103846
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url http://www.securityfocus.com/bid/103846
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567545
reference_id 1567545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567545
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2797
reference_id CVE-2018-2797
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2797
53
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://security.gentoo.org/glsa/201903-14
54
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1188
55
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1191
56
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1201
57
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1202
58
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1203
59
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1204
60
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1205
61
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1206
62
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1270
63
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1278
64
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1721
65
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1722
66
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1723
67
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1724
68
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1974
69
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://access.redhat.com/errata/RHSA-2018:1975
70
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://usn.ubuntu.com/3644-1/
71
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2797
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf14-48vb-w7gh
77
url VCID-rgf4-rwp5-dqd7
vulnerability_id VCID-rgf4-rwp5-dqd7
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2814.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2814
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63776
published_at 2026-04-02T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63794
published_at 2026-04-13T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63827
published_at 2026-04-12T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63842
published_at 2026-04-11T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63828
published_at 2026-04-09T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.6381
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63759
published_at 2026-04-07T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63802
published_at 2026-04-04T12:55:00Z
8
value 0.00454
scoring_system epss
scoring_elements 0.63715
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
15
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
16
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
17
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://www.debian.org/security/2018/dsa-4185
18
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://www.debian.org/security/2018/dsa-4225
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
20
reference_url http://www.securityfocus.com/bid/103798
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url http://www.securityfocus.com/bid/103798
21
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url http://www.securitytracker.com/id/1040697
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567121
reference_id 1567121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567121
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2814
reference_id CVE-2018-2814
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2814
49
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://security.gentoo.org/glsa/201903-14
50
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1188
51
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1191
52
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1201
53
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1202
54
reference_url https://access.redhat.com/errata/RHSA-2018:1203
reference_id RHSA-2018:1203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1203
55
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1204
56
reference_url https://access.redhat.com/errata/RHSA-2018:1205
reference_id RHSA-2018:1205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1205
57
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1206
58
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1270
59
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://access.redhat.com/errata/RHSA-2018:1278
60
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://usn.ubuntu.com/3644-1/
61
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2814
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgf4-rwp5-dqd7
78
url VCID-rvvx-ed8u-auc5
vulnerability_id VCID-rvvx-ed8u-auc5
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10357.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10357.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10357
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-13T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72703
published_at 2026-04-01T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.7271
published_at 2026-04-02T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72729
published_at 2026-04-04T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-07T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.72743
published_at 2026-04-08T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72757
published_at 2026-04-09T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72781
published_at 2026-04-11T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101355
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url http://www.securityfocus.com/bid/101355
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502614
reference_id 1502614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502614
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10357
reference_id CVE-2017-10357
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10357
80
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://security.gentoo.org/glsa/201710-31
81
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://security.gentoo.org/glsa/201711-14
82
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:2998
83
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:2999
84
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3046
85
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3047
86
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3264
87
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3267
88
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3268
89
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3392
90
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/
url https://access.redhat.com/errata/RHSA-2017:3453
91
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
92
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10357
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rvvx-ed8u-auc5
79
url VCID-rxem-v2fe-jfde
vulnerability_id VCID-rxem-v2fe-jfde
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5582
reference_id
reference_type
scores
0
value 0.04287
scoring_system epss
scoring_elements 0.88857
published_at 2026-04-13T12:55:00Z
1
value 0.04287
scoring_system epss
scoring_elements 0.88801
published_at 2026-04-01T12:55:00Z
2
value 0.04287
scoring_system epss
scoring_elements 0.88809
published_at 2026-04-02T12:55:00Z
3
value 0.04287
scoring_system epss
scoring_elements 0.88825
published_at 2026-04-04T12:55:00Z
4
value 0.04287
scoring_system epss
scoring_elements 0.88828
published_at 2026-04-07T12:55:00Z
5
value 0.04287
scoring_system epss
scoring_elements 0.88845
published_at 2026-04-08T12:55:00Z
6
value 0.04287
scoring_system epss
scoring_elements 0.8885
published_at 2026-04-09T12:55:00Z
7
value 0.04287
scoring_system epss
scoring_elements 0.88862
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://www.securitytracker.com/id/1037040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1385402
reference_id 1385402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1385402
10
reference_url http://www.securityfocus.com/bid/93623
reference_id 93623
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://www.securityfocus.com/bid/93623
11
reference_url http://www.debian.org/security/2016/dsa-3707
reference_id dsa-3707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://www.debian.org/security/2016/dsa-3707
12
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url https://security.gentoo.org/glsa/201611-04
13
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url https://security.gentoo.org/glsa/201701-43
14
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2016:2079
reference_id RHSA-2016:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2079
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-2079.html
reference_id RHSA-2016-2079.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2016-2079.html
17
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2658
reference_id RHSA-2016:2658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2658
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-2658.html
reference_id RHSA-2016-2658.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2016-2658.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0061
reference_id RHSA-2017:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0061
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0061.html
reference_id RHSA-2017-0061.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://rhn.redhat.com/errata/RHSA-2017-0061.html
27
reference_url https://usn.ubuntu.com/3121-1/
reference_id USN-3121-1
reference_type
scores
url https://usn.ubuntu.com/3121-1/
28
reference_url https://usn.ubuntu.com/3130-1/
reference_id USN-3130-1
reference_type
scores
url https://usn.ubuntu.com/3130-1/
29
reference_url http://www.ubuntu.com/usn/USN-3130-1
reference_id USN-3130-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://www.ubuntu.com/usn/USN-3130-1
30
reference_url https://usn.ubuntu.com/3154-1/
reference_id USN-3154-1
reference_type
scores
url https://usn.ubuntu.com/3154-1/
31
reference_url http://www.ubuntu.com/usn/USN-3154-1
reference_id USN-3154-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/
url http://www.ubuntu.com/usn/USN-3154-1
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5582
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxem-v2fe-jfde
80
url VCID-snqh-ebq3-hubn
vulnerability_id VCID-snqh-ebq3-hubn
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5548
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67116
published_at 2026-04-13T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67044
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67082
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67106
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6708
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67129
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67142
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67161
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67147
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5548
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413920
reference_id 1413920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413920
17
reference_url http://www.securityfocus.com/bid/95559
reference_id 95559
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://www.securityfocus.com/bid/95559
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5548
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn
81
url VCID-ssf2-jqkb-3qgw
vulnerability_id VCID-ssf2-jqkb-3qgw
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1776.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1776.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3500
reference_id
reference_type
scores
0
value 0.11609
scoring_system epss
scoring_elements 0.9365
published_at 2026-04-13T12:55:00Z
1
value 0.11609
scoring_system epss
scoring_elements 0.93613
published_at 2026-04-01T12:55:00Z
2
value 0.11609
scoring_system epss
scoring_elements 0.93623
published_at 2026-04-02T12:55:00Z
3
value 0.11609
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-04T12:55:00Z
4
value 0.11609
scoring_system epss
scoring_elements 0.93633
published_at 2026-04-07T12:55:00Z
5
value 0.11609
scoring_system epss
scoring_elements 0.93642
published_at 2026-04-08T12:55:00Z
6
value 0.11609
scoring_system epss
scoring_elements 0.93644
published_at 2026-04-09T12:55:00Z
7
value 0.11609
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3500
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10166
20
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
21
reference_url http://www.debian.org/security/2016/dsa-3641
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.debian.org/security/2016/dsa-3641
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
23
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
24
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.securityfocus.com/bid/91787
25
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.securitytracker.com/id/1036365
26
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.ubuntu.com/usn/USN-3043-1
27
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.ubuntu.com/usn/USN-3062-1
28
reference_url http://www.ubuntu.com/usn/USN-3077-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url http://www.ubuntu.com/usn/USN-3077-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1357008
reference_id 1357008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1357008
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3500
reference_id CVE-2016-3500
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-3500
43
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://security.gentoo.org/glsa/201610-08
44
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://security.gentoo.org/glsa/201701-43
45
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://access.redhat.com/errata/RHSA-2016:1458
46
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://access.redhat.com/errata/RHSA-2016:1475
47
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://access.redhat.com/errata/RHSA-2016:1476
48
reference_url https://access.redhat.com/errata/RHSA-2016:1477
reference_id RHSA-2016:1477
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/
url https://access.redhat.com/errata/RHSA-2016:1477
49
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
50
reference_url https://access.redhat.com/errata/RHSA-2016:1776
reference_id RHSA-2016:1776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1776
51
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
52
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
53
reference_url https://usn.ubuntu.com/3077-1/
reference_id USN-3077-1
reference_type
scores
url https://usn.ubuntu.com/3077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3500
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssf2-jqkb-3qgw
82
url VCID-taqg-ukr5-ybbk
vulnerability_id VCID-taqg-ukr5-ybbk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0701.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0701.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0702.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0702.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0708.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0708.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0716.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-0716.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-1039.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://rhn.redhat.com/errata/RHSA-2016-1039.html
19
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json
20
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3426
reference_id
reference_type
scores
0
value 0.01595
scoring_system epss
scoring_elements 0.81605
published_at 2026-04-01T12:55:00Z
1
value 0.01595
scoring_system epss
scoring_elements 0.81668
published_at 2026-04-13T12:55:00Z
2
value 0.01595
scoring_system epss
scoring_elements 0.81675
published_at 2026-04-12T12:55:00Z
3
value 0.01595
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-11T12:55:00Z
4
value 0.01595
scoring_system epss
scoring_elements 0.81667
published_at 2026-04-09T12:55:00Z
5
value 0.01595
scoring_system epss
scoring_elements 0.81663
published_at 2026-04-08T12:55:00Z
6
value 0.01595
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-02T12:55:00Z
7
value 0.01595
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-07T12:55:00Z
8
value 0.01595
scoring_system epss
scoring_elements 0.81638
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3426
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
30
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.debian.org/security/2016/dsa-3558
31
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
33
reference_url http://www.securityfocus.com/bid/86449
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.securityfocus.com/bid/86449
34
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.securitytracker.com/id/1035596
35
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url http://www.ubuntu.com/usn/USN-2963-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328059
reference_id 1328059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328059
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3426
reference_id CVE-2016-3426
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3426
40
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url https://security.gentoo.org/glsa/201610-08
41
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
42
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
43
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
44
reference_url https://access.redhat.com/errata/RHSA-2016:0701
reference_id RHSA-2016:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0701
45
reference_url https://access.redhat.com/errata/RHSA-2016:0702
reference_id RHSA-2016:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0702
46
reference_url https://access.redhat.com/errata/RHSA-2016:0708
reference_id RHSA-2016:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0708
47
reference_url https://access.redhat.com/errata/RHSA-2016:0716
reference_id RHSA-2016:0716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0716
48
reference_url https://access.redhat.com/errata/RHSA-2016:1039
reference_id RHSA-2016:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1039
49
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url https://access.redhat.com/errata/RHSA-2016:1430
50
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/
url https://access.redhat.com/errata/RHSA-2017:1216
51
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3426
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk
83
url VCID-tc8v-xrjj-hucq
vulnerability_id VCID-tc8v-xrjj-hucq
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3272
reference_id
reference_type
scores
0
value 0.01126
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-01T12:55:00Z
1
value 0.01126
scoring_system epss
scoring_elements 0.78285
published_at 2026-04-13T12:55:00Z
2
value 0.01126
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-12T12:55:00Z
3
value 0.01126
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-11T12:55:00Z
4
value 0.01126
scoring_system epss
scoring_elements 0.78282
published_at 2026-04-09T12:55:00Z
5
value 0.01126
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-08T12:55:00Z
6
value 0.01126
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-02T12:55:00Z
7
value 0.01126
scoring_system epss
scoring_elements 0.7825
published_at 2026-04-07T12:55:00Z
8
value 0.01126
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413554
reference_id 1413554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413554
17
reference_url http://www.securityfocus.com/bid/95533
reference_id 95533
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://www.securityfocus.com/bid/95533
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3272
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq
84
url VCID-u1c5-pgk4-8bcj
vulnerability_id VCID-u1c5-pgk4-8bcj
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10346.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10346.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10346
reference_id
reference_type
scores
0
value 0.00578
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-13T12:55:00Z
1
value 0.00578
scoring_system epss
scoring_elements 0.68776
published_at 2026-04-01T12:55:00Z
2
value 0.00578
scoring_system epss
scoring_elements 0.68794
published_at 2026-04-02T12:55:00Z
3
value 0.00578
scoring_system epss
scoring_elements 0.68814
published_at 2026-04-04T12:55:00Z
4
value 0.00578
scoring_system epss
scoring_elements 0.68793
published_at 2026-04-07T12:55:00Z
5
value 0.00578
scoring_system epss
scoring_elements 0.68843
published_at 2026-04-08T12:55:00Z
6
value 0.00578
scoring_system epss
scoring_elements 0.68862
published_at 2026-04-09T12:55:00Z
7
value 0.00578
scoring_system epss
scoring_elements 0.68885
published_at 2026-04-11T12:55:00Z
8
value 0.00578
scoring_system epss
scoring_elements 0.68871
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.7
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
23
reference_url http://www.securityfocus.com/bid/101315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url http://www.securityfocus.com/bid/101315
24
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url http://www.securitytracker.com/id/1039596
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501873
reference_id 1501873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501873
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10346
reference_id CVE-2017-10346
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10346
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10346
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1c5-pgk4-8bcj
85
url VCID-u3rj-qyrr-vkbw
vulnerability_id VCID-u3rj-qyrr-vkbw
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5542
reference_id
reference_type
scores
0
value 0.02018
scoring_system epss
scoring_elements 0.83752
published_at 2026-04-13T12:55:00Z
1
value 0.02018
scoring_system epss
scoring_elements 0.83686
published_at 2026-04-01T12:55:00Z
2
value 0.02018
scoring_system epss
scoring_elements 0.83699
published_at 2026-04-02T12:55:00Z
3
value 0.02018
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-04T12:55:00Z
4
value 0.02018
scoring_system epss
scoring_elements 0.83716
published_at 2026-04-07T12:55:00Z
5
value 0.02018
scoring_system epss
scoring_elements 0.8374
published_at 2026-04-08T12:55:00Z
6
value 0.02018
scoring_system epss
scoring_elements 0.83746
published_at 2026-04-09T12:55:00Z
7
value 0.02018
scoring_system epss
scoring_elements 0.83763
published_at 2026-04-11T12:55:00Z
8
value 0.02018
scoring_system epss
scoring_elements 0.83756
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.securitytracker.com/id/1037040
reference_id 1037040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://www.securitytracker.com/id/1037040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1385723
reference_id 1385723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1385723
10
reference_url http://www.securityfocus.com/bid/93643
reference_id 93643
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://www.securityfocus.com/bid/93643
11
reference_url http://www.debian.org/security/2016/dsa-3707
reference_id dsa-3707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://www.debian.org/security/2016/dsa-3707
12
reference_url https://security.gentoo.org/glsa/201611-04
reference_id GLSA-201611-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url https://security.gentoo.org/glsa/201611-04
13
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url https://security.gentoo.org/glsa/201701-43
14
reference_url https://security.netapp.com/advisory/ntap-20161019-0001/
reference_id ntap-20161019-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url https://security.netapp.com/advisory/ntap-20161019-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2016:2079
reference_id RHSA-2016:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2079
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-2079.html
reference_id RHSA-2016-2079.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2079.html
17
reference_url https://access.redhat.com/errata/RHSA-2016:2088
reference_id RHSA-2016:2088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2088
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2088.html
reference_id RHSA-2016-2088.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2088.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2089
reference_id RHSA-2016:2089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2089
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2089.html
reference_id RHSA-2016-2089.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2089.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2090
reference_id RHSA-2016:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2090
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2090.html
reference_id RHSA-2016-2090.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2090.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2136
reference_id RHSA-2016:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2136
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-2136.html
reference_id RHSA-2016-2136.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2136.html
25
reference_url https://access.redhat.com/errata/RHSA-2016:2137
reference_id RHSA-2016:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2137
26
reference_url http://rhn.redhat.com/errata/RHSA-2016-2137.html
reference_id RHSA-2016-2137.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2137.html
27
reference_url https://access.redhat.com/errata/RHSA-2016:2138
reference_id RHSA-2016:2138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2138
28
reference_url http://rhn.redhat.com/errata/RHSA-2016-2138.html
reference_id RHSA-2016-2138.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2138.html
29
reference_url https://access.redhat.com/errata/RHSA-2016:2658
reference_id RHSA-2016:2658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2658
30
reference_url http://rhn.redhat.com/errata/RHSA-2016-2658.html
reference_id RHSA-2016-2658.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2658.html
31
reference_url https://access.redhat.com/errata/RHSA-2016:2659
reference_id RHSA-2016:2659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2659
32
reference_url http://rhn.redhat.com/errata/RHSA-2016-2659.html
reference_id RHSA-2016-2659.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2016-2659.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0061
reference_id RHSA-2017:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0061
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0061.html
reference_id RHSA-2017-0061.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0061.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url https://access.redhat.com/errata/RHSA-2017:1216
36
reference_url https://usn.ubuntu.com/3121-1/
reference_id USN-3121-1
reference_type
scores
url https://usn.ubuntu.com/3121-1/
37
reference_url https://usn.ubuntu.com/3130-1/
reference_id USN-3130-1
reference_type
scores
url https://usn.ubuntu.com/3130-1/
38
reference_url http://www.ubuntu.com/usn/USN-3130-1
reference_id USN-3130-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://www.ubuntu.com/usn/USN-3130-1
39
reference_url https://usn.ubuntu.com/3154-1/
reference_id USN-3154-1
reference_type
scores
url https://usn.ubuntu.com/3154-1/
40
reference_url http://www.ubuntu.com/usn/USN-3154-1
reference_id USN-3154-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/
url http://www.ubuntu.com/usn/USN-3154-1
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-5542
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw
86
url VCID-uc2v-fweb-cfew
vulnerability_id VCID-uc2v-fweb-cfew
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2634
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-13T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32851
published_at 2026-04-01T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32981
published_at 2026-04-02T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-04T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32837
published_at 2026-04-07T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32884
published_at 2026-04-08T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32914
published_at 2026-04-09T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32917
published_at 2026-04-11T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32879
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2634
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102592
reference_id 102592
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url http://www.securityfocus.com/bid/102592
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534943
reference_id 1534943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534943
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0349
31
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0351
32
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0352
33
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0458
34
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:0521
35
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:1463
36
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://access.redhat.com/errata/RHSA-2018:1812
37
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://usn.ubuntu.com/3613-1/
38
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2634
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc2v-fweb-cfew
87
url VCID-upyj-tdcf-8kbe
vulnerability_id VCID-upyj-tdcf-8kbe
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1776.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://rhn.redhat.com/errata/RHSA-2016-1776.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3606
reference_id
reference_type
scores
0
value 0.03931
scoring_system epss
scoring_elements 0.88327
published_at 2026-04-13T12:55:00Z
1
value 0.03931
scoring_system epss
scoring_elements 0.88271
published_at 2026-04-01T12:55:00Z
2
value 0.03931
scoring_system epss
scoring_elements 0.8828
published_at 2026-04-02T12:55:00Z
3
value 0.03931
scoring_system epss
scoring_elements 0.88295
published_at 2026-04-04T12:55:00Z
4
value 0.03931
scoring_system epss
scoring_elements 0.88299
published_at 2026-04-07T12:55:00Z
5
value 0.03931
scoring_system epss
scoring_elements 0.88319
published_at 2026-04-08T12:55:00Z
6
value 0.03931
scoring_system epss
scoring_elements 0.88324
published_at 2026-04-09T12:55:00Z
7
value 0.03931
scoring_system epss
scoring_elements 0.88335
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3606
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
20
reference_url http://www.debian.org/security/2016/dsa-3641
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.debian.org/security/2016/dsa-3641
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
22
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
23
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.securityfocus.com/bid/91787
24
reference_url http://www.securityfocus.com/bid/91912
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.securityfocus.com/bid/91912
25
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.securitytracker.com/id/1036365
26
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.ubuntu.com/usn/USN-3043-1
27
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.ubuntu.com/usn/USN-3062-1
28
reference_url http://www.ubuntu.com/usn/USN-3077-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url http://www.ubuntu.com/usn/USN-3077-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1356963
reference_id 1356963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1356963
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3606
reference_id CVE-2016-3606
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3606
40
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://security.gentoo.org/glsa/201610-08
41
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://security.gentoo.org/glsa/201701-43
42
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://access.redhat.com/errata/RHSA-2016:1458
43
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://access.redhat.com/errata/RHSA-2016:1475
44
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/
url https://access.redhat.com/errata/RHSA-2016:1476
45
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
46
reference_url https://access.redhat.com/errata/RHSA-2016:1776
reference_id RHSA-2016:1776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1776
47
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
48
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
49
reference_url https://usn.ubuntu.com/3077-1/
reference_id USN-3077-1
reference_type
scores
url https://usn.ubuntu.com/3077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3606
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upyj-tdcf-8kbe
88
url VCID-v64t-4c46-3bhj
vulnerability_id VCID-v64t-4c46-3bhj
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, the worst of which may allow execution of arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3253
reference_id
reference_type
scores
0
value 0.01827
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-01T12:55:00Z
1
value 0.01827
scoring_system epss
scoring_elements 0.82894
published_at 2026-04-13T12:55:00Z
2
value 0.01827
scoring_system epss
scoring_elements 0.82899
published_at 2026-04-12T12:55:00Z
3
value 0.01827
scoring_system epss
scoring_elements 0.82904
published_at 2026-04-11T12:55:00Z
4
value 0.01827
scoring_system epss
scoring_elements 0.82888
published_at 2026-04-09T12:55:00Z
5
value 0.01827
scoring_system epss
scoring_elements 0.82881
published_at 2026-04-08T12:55:00Z
6
value 0.01827
scoring_system epss
scoring_elements 0.82847
published_at 2026-04-02T12:55:00Z
7
value 0.01827
scoring_system epss
scoring_elements 0.82856
published_at 2026-04-07T12:55:00Z
8
value 0.01827
scoring_system epss
scoring_elements 0.8286
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3253
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.securitytracker.com/id/1037637
reference_id 1037637
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://www.securitytracker.com/id/1037637
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1413583
reference_id 1413583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1413583
17
reference_url http://www.securityfocus.com/bid/95498
reference_id 95498
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://www.securityfocus.com/bid/95498
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
19
reference_url http://www.debian.org/security/2017/dsa-3782
reference_id dsa-3782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://www.debian.org/security/2017/dsa-3782
20
reference_url https://security.gentoo.org/glsa/201701-65
reference_id GLSA-201701-65
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url https://security.gentoo.org/glsa/201701-65
21
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url https://security.gentoo.org/glsa/201707-01
22
reference_url https://security.netapp.com/advisory/ntap-20170119-0001/
reference_id ntap-20170119-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url https://security.netapp.com/advisory/ntap-20170119-0001/
23
reference_url https://access.redhat.com/errata/RHSA-2017:0175
reference_id RHSA-2017:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0175
24
reference_url http://rhn.redhat.com/errata/RHSA-2017-0175.html
reference_id RHSA-2017-0175.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0175.html
25
reference_url https://access.redhat.com/errata/RHSA-2017:0176
reference_id RHSA-2017:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0176
26
reference_url http://rhn.redhat.com/errata/RHSA-2017-0176.html
reference_id RHSA-2017-0176.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0176.html
27
reference_url https://access.redhat.com/errata/RHSA-2017:0177
reference_id RHSA-2017:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0177
28
reference_url http://rhn.redhat.com/errata/RHSA-2017-0177.html
reference_id RHSA-2017-0177.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0177.html
29
reference_url https://access.redhat.com/errata/RHSA-2017:0180
reference_id RHSA-2017:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0180
30
reference_url http://rhn.redhat.com/errata/RHSA-2017-0180.html
reference_id RHSA-2017-0180.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0180.html
31
reference_url https://access.redhat.com/errata/RHSA-2017:0263
reference_id RHSA-2017:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0263
32
reference_url http://rhn.redhat.com/errata/RHSA-2017-0263.html
reference_id RHSA-2017-0263.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0263.html
33
reference_url https://access.redhat.com/errata/RHSA-2017:0269
reference_id RHSA-2017:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0269
34
reference_url http://rhn.redhat.com/errata/RHSA-2017-0269.html
reference_id RHSA-2017-0269.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0269.html
35
reference_url https://access.redhat.com/errata/RHSA-2017:0336
reference_id RHSA-2017:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0336
36
reference_url http://rhn.redhat.com/errata/RHSA-2017-0336.html
reference_id RHSA-2017-0336.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0336.html
37
reference_url https://access.redhat.com/errata/RHSA-2017:0337
reference_id RHSA-2017:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0337
38
reference_url http://rhn.redhat.com/errata/RHSA-2017-0337.html
reference_id RHSA-2017-0337.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0337.html
39
reference_url https://access.redhat.com/errata/RHSA-2017:0338
reference_id RHSA-2017:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0338
40
reference_url http://rhn.redhat.com/errata/RHSA-2017-0338.html
reference_id RHSA-2017-0338.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url http://rhn.redhat.com/errata/RHSA-2017-0338.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:1216
reference_id RHSA-2017:1216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/
url https://access.redhat.com/errata/RHSA-2017:1216
42
reference_url https://usn.ubuntu.com/3179-1/
reference_id USN-3179-1
reference_type
scores
url https://usn.ubuntu.com/3179-1/
43
reference_url https://usn.ubuntu.com/3194-1/
reference_id USN-3194-1
reference_type
scores
url https://usn.ubuntu.com/3194-1/
44
reference_url https://usn.ubuntu.com/3198-1/
reference_id USN-3198-1
reference_type
scores
url https://usn.ubuntu.com/3198-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3253
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj
89
url VCID-v6ym-2522-fqgd
vulnerability_id VCID-v6ym-2522-fqgd
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0511.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0511.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0512.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0512.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0513.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0513.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0514.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0514.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0515.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0515.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0516.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-0516.html
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0636
reference_id
reference_type
scores
0
value 0.13022
scoring_system epss
scoring_elements 0.94087
published_at 2026-04-13T12:55:00Z
1
value 0.13022
scoring_system epss
scoring_elements 0.94057
published_at 2026-04-02T12:55:00Z
2
value 0.13022
scoring_system epss
scoring_elements 0.94067
published_at 2026-04-04T12:55:00Z
3
value 0.13022
scoring_system epss
scoring_elements 0.9407
published_at 2026-04-07T12:55:00Z
4
value 0.13022
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-08T12:55:00Z
5
value 0.13022
scoring_system epss
scoring_elements 0.94083
published_at 2026-04-09T12:55:00Z
6
value 0.13022
scoring_system epss
scoring_elements 0.94047
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0636
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
23
reference_url https://security.netapp.com/advisory/ntap-20160328-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url https://security.netapp.com/advisory/ntap-20160328-0001/
24
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.debian.org/security/2016/dsa-3558
25
reference_url http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
27
reference_url http://www.securityfocus.com/bid/85376
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.securityfocus.com/bid/85376
28
reference_url http://www.securitytracker.com/id/1035401
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.securitytracker.com/id/1035401
29
reference_url http://www.ubuntu.com/usn/USN-2942-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url http://www.ubuntu.com/usn/USN-2942-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1320650
reference_id 1320650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1320650
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0636
reference_id CVE-2016-0636
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0636
47
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url https://security.gentoo.org/glsa/201606-18
48
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/
url https://security.gentoo.org/glsa/201610-08
49
reference_url https://access.redhat.com/errata/RHSA-2016:0511
reference_id RHSA-2016:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0511
50
reference_url https://access.redhat.com/errata/RHSA-2016:0512
reference_id RHSA-2016:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0512
51
reference_url https://access.redhat.com/errata/RHSA-2016:0513
reference_id RHSA-2016:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0513
52
reference_url https://access.redhat.com/errata/RHSA-2016:0514
reference_id RHSA-2016:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0514
53
reference_url https://access.redhat.com/errata/RHSA-2016:0515
reference_id RHSA-2016:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0515
54
reference_url https://access.redhat.com/errata/RHSA-2016:0516
reference_id RHSA-2016:0516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0516
55
reference_url https://usn.ubuntu.com/2942-1/
reference_id USN-2942-1
reference_type
scores
url https://usn.ubuntu.com/2942-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0636
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6ym-2522-fqgd
90
url VCID-vu44-899q-6kct
vulnerability_id VCID-vu44-899q-6kct
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
reference_id
reference_type
scores
0
value 0.01893
scoring_system epss
scoring_elements 0.83196
published_at 2026-04-13T12:55:00Z
1
value 0.01893
scoring_system epss
scoring_elements 0.83129
published_at 2026-04-01T12:55:00Z
2
value 0.01893
scoring_system epss
scoring_elements 0.83146
published_at 2026-04-02T12:55:00Z
3
value 0.01893
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-04T12:55:00Z
4
value 0.01893
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-07T12:55:00Z
5
value 0.01893
scoring_system epss
scoring_elements 0.83183
published_at 2026-04-08T12:55:00Z
6
value 0.01893
scoring_system epss
scoring_elements 0.8319
published_at 2026-04-09T12:55:00Z
7
value 0.01893
scoring_system epss
scoring_elements 0.83206
published_at 2026-04-11T12:55:00Z
8
value 0.01893
scoring_system epss
scoring_elements 0.832
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
reference_id 1471534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
29
reference_url http://www.securityfocus.com/bid/99731
reference_id 99731
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securityfocus.com/bid/99731
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10074
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu44-899q-6kct
91
url VCID-w83z-5wt6-j3fz
vulnerability_id VCID-w83z-5wt6-j3fz
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2603
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26426
published_at 2026-04-13T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27761
published_at 2026-04-07T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27874
published_at 2026-04-01T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27833
published_at 2026-04-12T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27876
published_at 2026-04-11T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27928
published_at 2026-04-02T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.2787
published_at 2026-04-09T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2797
published_at 2026-04-04T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27828
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102625
reference_id 102625
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url http://www.securityfocus.com/bid/102625
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534553
reference_id 1534553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534553
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2603
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w83z-5wt6-j3fz
92
url VCID-wbup-e69y-3fgh
vulnerability_id VCID-wbup-e69y-3fgh
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0448
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.56056
published_at 2026-04-13T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.56073
published_at 2026-04-12T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.55919
published_at 2026-04-01T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56031
published_at 2026-04-02T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56051
published_at 2026-04-04T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.5603
published_at 2026-04-07T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.56081
published_at 2026-04-08T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56084
published_at 2026-04-09T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56096
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0448
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securityfocus.com/bid/81123
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81123
46
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
47
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
48
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299073
reference_id 1299073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299073
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0448
reference_id CVE-2016-0448
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0448
60
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
61
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
62
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
63
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
64
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
65
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
66
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
67
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
68
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
69
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
70
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
71
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
72
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
73
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
74
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
75
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
76
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0448
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh
93
url VCID-wcc9-n2hm-87fx
vulnerability_id VCID-wcc9-n2hm-87fx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-13T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-01T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-02T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75109
published_at 2026-04-04T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-07T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-08T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-09T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75155
published_at 2026-04-11T12:55:00Z
8
value 0.00866
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
reference_id 1471535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
29
reference_url http://www.securityfocus.com/bid/99756
reference_id 99756
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securityfocus.com/bid/99756
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10067
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcc9-n2hm-87fx
94
url VCID-wchf-kwep-7khm
vulnerability_id VCID-wchf-kwep-7khm
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0650.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0650.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0651.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0651.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0675.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0675.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0676.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0676.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0677.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0677.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0678.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0678.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0679.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0679.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0723.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://rhn.redhat.com/errata/RHSA-2016-0723.html
15
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3425.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3425.json
16
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3425
reference_id
reference_type
scores
0
value 0.09098
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-01T12:55:00Z
1
value 0.09098
scoring_system epss
scoring_elements 0.92635
published_at 2026-04-02T12:55:00Z
2
value 0.09098
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-04T12:55:00Z
3
value 0.09098
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-07T12:55:00Z
4
value 0.09098
scoring_system epss
scoring_elements 0.92653
published_at 2026-04-08T12:55:00Z
5
value 0.09098
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-09T12:55:00Z
6
value 0.09098
scoring_system epss
scoring_elements 0.92663
published_at 2026-04-12T12:55:00Z
7
value 0.09098
scoring_system epss
scoring_elements 0.92662
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3425
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10159
26
reference_url https://security.netapp.com/advisory/ntap-20160420-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url https://security.netapp.com/advisory/ntap-20160420-0001/
27
reference_url http://www.debian.org/security/2016/dsa-3558
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.debian.org/security/2016/dsa-3558
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
29
reference_url http://www.securityfocus.com/bid/86434
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.securityfocus.com/bid/86434
30
reference_url http://www.securitytracker.com/id/1035596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.securitytracker.com/id/1035596
31
reference_url http://www.ubuntu.com/usn/USN-2963-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.ubuntu.com/usn/USN-2963-1
32
reference_url http://www.ubuntu.com/usn/USN-2964-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.ubuntu.com/usn/USN-2964-1
33
reference_url http://www.ubuntu.com/usn/USN-2972-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url http://www.ubuntu.com/usn/USN-2972-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328040
reference_id 1328040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328040
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3425
reference_id CVE-2016-3425
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-3425
43
reference_url https://security.gentoo.org/glsa/201606-18
reference_id GLSA-201606-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/
url https://security.gentoo.org/glsa/201606-18
44
reference_url https://access.redhat.com/errata/RHSA-2016:0650
reference_id RHSA-2016:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0650
45
reference_url https://access.redhat.com/errata/RHSA-2016:0651
reference_id RHSA-2016:0651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0651
46
reference_url https://access.redhat.com/errata/RHSA-2016:0675
reference_id RHSA-2016:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0675
47
reference_url https://access.redhat.com/errata/RHSA-2016:0676
reference_id RHSA-2016:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0676
48
reference_url https://access.redhat.com/errata/RHSA-2016:0677
reference_id RHSA-2016:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0677
49
reference_url https://access.redhat.com/errata/RHSA-2016:0678
reference_id RHSA-2016:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0678
50
reference_url https://access.redhat.com/errata/RHSA-2016:0679
reference_id RHSA-2016:0679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0679
51
reference_url https://access.redhat.com/errata/RHSA-2016:0723
reference_id RHSA-2016:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0723
52
reference_url https://usn.ubuntu.com/2963-1/
reference_id USN-2963-1
reference_type
scores
url https://usn.ubuntu.com/2963-1/
53
reference_url https://usn.ubuntu.com/2964-1/
reference_id USN-2964-1
reference_type
scores
url https://usn.ubuntu.com/2964-1/
54
reference_url https://usn.ubuntu.com/2972-1/
reference_id USN-2972-1
reference_type
scores
url https://usn.ubuntu.com/2972-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3425
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wchf-kwep-7khm
95
url VCID-wjun-m9my-5qbb
vulnerability_id VCID-wjun-m9my-5qbb
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10295.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10295
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57621
published_at 2026-04-13T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57509
published_at 2026-04-01T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57593
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57589
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57642
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57646
published_at 2026-04-09T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57661
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101384
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url http://www.securityfocus.com/bid/101384
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502687
reference_id 1502687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502687
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10295
reference_id CVE-2017-10295
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10295
81
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://security.gentoo.org/glsa/201710-31
82
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://security.gentoo.org/glsa/201711-14
83
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:2998
84
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:2999
85
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3046
86
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3047
87
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3264
88
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3267
89
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3268
90
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3392
91
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/
url https://access.redhat.com/errata/RHSA-2017:3453
92
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
93
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10295
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjun-m9my-5qbb
96
url VCID-wqcq-rktw-jyct
vulnerability_id VCID-wqcq-rktw-jyct
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0483
reference_id
reference_type
scores
0
value 0.12599
scoring_system epss
scoring_elements 0.93956
published_at 2026-04-13T12:55:00Z
1
value 0.12599
scoring_system epss
scoring_elements 0.93955
published_at 2026-04-11T12:55:00Z
2
value 0.12599
scoring_system epss
scoring_elements 0.93919
published_at 2026-04-01T12:55:00Z
3
value 0.12599
scoring_system epss
scoring_elements 0.93928
published_at 2026-04-02T12:55:00Z
4
value 0.12599
scoring_system epss
scoring_elements 0.93938
published_at 2026-04-04T12:55:00Z
5
value 0.12599
scoring_system epss
scoring_elements 0.9394
published_at 2026-04-07T12:55:00Z
6
value 0.12599
scoring_system epss
scoring_elements 0.93949
published_at 2026-04-08T12:55:00Z
7
value 0.12599
scoring_system epss
scoring_elements 0.93952
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0483
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
46
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
47
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
48
reference_url http://www.zerodayinitiative.com/advisories/ZDI-16-032
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-16-032
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299441
reference_id 1299441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299441
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0483
reference_id CVE-2016-0483
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0483
62
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
63
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
64
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
65
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
66
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
67
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
68
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
69
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
70
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
71
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
72
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
73
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
74
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
75
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
76
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
77
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
78
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0483
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct
97
url VCID-xqrm-1bu9-abfe
vulnerability_id VCID-xqrm-1bu9-abfe
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2637
reference_id
reference_type
scores
0
value 0.00192
scoring_system epss
scoring_elements 0.41117
published_at 2026-04-13T12:55:00Z
1
value 0.00192
scoring_system epss
scoring_elements 0.41052
published_at 2026-04-01T12:55:00Z
2
value 0.00192
scoring_system epss
scoring_elements 0.41134
published_at 2026-04-12T12:55:00Z
3
value 0.00192
scoring_system epss
scoring_elements 0.41164
published_at 2026-04-04T12:55:00Z
4
value 0.00192
scoring_system epss
scoring_elements 0.41091
published_at 2026-04-07T12:55:00Z
5
value 0.00192
scoring_system epss
scoring_elements 0.41139
published_at 2026-04-08T12:55:00Z
6
value 0.00192
scoring_system epss
scoring_elements 0.41147
published_at 2026-04-09T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.41167
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102576
reference_id 102576
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url http://www.securityfocus.com/bid/102576
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534970
reference_id 1534970
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534970
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2637
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqrm-1bu9-abfe
98
url VCID-xx3g-udjr-7yep
vulnerability_id VCID-xx3g-udjr-7yep
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10355.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10355.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10355
reference_id
reference_type
scores
0
value 0.06296
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-13T12:55:00Z
1
value 0.06296
scoring_system epss
scoring_elements 0.90901
published_at 2026-04-01T12:55:00Z
2
value 0.06296
scoring_system epss
scoring_elements 0.90907
published_at 2026-04-02T12:55:00Z
3
value 0.06296
scoring_system epss
scoring_elements 0.90916
published_at 2026-04-04T12:55:00Z
4
value 0.06296
scoring_system epss
scoring_elements 0.90927
published_at 2026-04-07T12:55:00Z
5
value 0.06296
scoring_system epss
scoring_elements 0.90938
published_at 2026-04-08T12:55:00Z
6
value 0.06296
scoring_system epss
scoring_elements 0.90944
published_at 2026-04-09T12:55:00Z
7
value 0.06296
scoring_system epss
scoring_elements 0.90953
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10355
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
18
reference_url https://security.netapp.com/advisory/ntap-20171019-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://security.netapp.com/advisory/ntap-20171019-0001/
19
reference_url https://www.debian.org/security/2017/dsa-4015
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://www.debian.org/security/2017/dsa-4015
20
reference_url https://www.debian.org/security/2017/dsa-4048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://www.debian.org/security/2017/dsa-4048
21
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
22
reference_url http://www.securityfocus.com/bid/101369
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url http://www.securityfocus.com/bid/101369
23
reference_url http://www.securitytracker.com/id/1039596
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url http://www.securitytracker.com/id/1039596
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1502869
reference_id 1502869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1502869
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
80
reference_url https://blogs.securiteam.com/index.php/archives/3271
reference_id CVE-2017-10355
reference_type exploit
scores
url https://blogs.securiteam.com/index.php/archives/3271
81
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/44057.md
reference_id CVE-2017-10355
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/44057.md
82
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10355
reference_id CVE-2017-10355
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10355
83
reference_url https://security.gentoo.org/glsa/201710-31
reference_id GLSA-201710-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://security.gentoo.org/glsa/201710-31
84
reference_url https://security.gentoo.org/glsa/201711-14
reference_id GLSA-201711-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://security.gentoo.org/glsa/201711-14
85
reference_url https://access.redhat.com/errata/RHSA-2017:2998
reference_id RHSA-2017:2998
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:2998
86
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:2999
87
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3046
88
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3047
89
reference_url https://access.redhat.com/errata/RHSA-2017:3264
reference_id RHSA-2017:3264
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3264
90
reference_url https://access.redhat.com/errata/RHSA-2017:3267
reference_id RHSA-2017:3267
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3267
91
reference_url https://access.redhat.com/errata/RHSA-2017:3268
reference_id RHSA-2017:3268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3268
92
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3392
93
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/
url https://access.redhat.com/errata/RHSA-2017:3453
94
reference_url https://usn.ubuntu.com/3473-1/
reference_id USN-3473-1
reference_type
scores
url https://usn.ubuntu.com/3473-1/
95
reference_url https://usn.ubuntu.com/3497-1/
reference_id USN-3497-1
reference_type
scores
url https://usn.ubuntu.com/3497-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-10355
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3g-udjr-7yep
99
url VCID-y34y-ewv6-fkhb
vulnerability_id VCID-y34y-ewv6-fkhb
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2618
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33108
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.32987
published_at 2026-04-13T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33012
published_at 2026-04-12T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.33051
published_at 2026-04-11T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33047
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33017
published_at 2026-04-08T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.32971
published_at 2026-04-07T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33141
published_at 2026-04-04T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32979
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securityfocus.com/bid/102612
reference_id 102612
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url http://www.securityfocus.com/bid/102612
19
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url http://www.securitytracker.com/id/1040203
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534762
reference_id 1534762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534762
21
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
22
reference_url https://www.debian.org/security/2018/dsa-4144
reference_id dsa-4144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://www.debian.org/security/2018/dsa-4144
23
reference_url https://www.debian.org/security/2018/dsa-4166
reference_id dsa-4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://www.debian.org/security/2018/dsa-4166
24
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
25
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
26
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
27
reference_url https://access.redhat.com/errata/RHSA-2018:0095
reference_id RHSA-2018:0095
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0095
28
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0099
29
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0100
30
reference_url https://access.redhat.com/errata/RHSA-2018:0115
reference_id RHSA-2018:0115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0115
31
reference_url https://access.redhat.com/errata/RHSA-2018:0349
reference_id RHSA-2018:0349
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0349
32
reference_url https://access.redhat.com/errata/RHSA-2018:0351
reference_id RHSA-2018:0351
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0351
33
reference_url https://access.redhat.com/errata/RHSA-2018:0352
reference_id RHSA-2018:0352
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0352
34
reference_url https://access.redhat.com/errata/RHSA-2018:0458
reference_id RHSA-2018:0458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0458
35
reference_url https://access.redhat.com/errata/RHSA-2018:0521
reference_id RHSA-2018:0521
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:0521
36
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:1463
37
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://access.redhat.com/errata/RHSA-2018:1812
38
reference_url https://usn.ubuntu.com/3613-1/
reference_id USN-3613-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://usn.ubuntu.com/3613-1/
39
reference_url https://usn.ubuntu.com/3614-1/
reference_id USN-3614-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/
url https://usn.ubuntu.com/3614-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2618
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y34y-ewv6-fkhb
100
url VCID-z4et-kgqx-qkgy
vulnerability_id VCID-z4et-kgqx-qkgy
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2799.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2799
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-02T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31385
published_at 2026-04-01T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31564
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31466
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31469
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.3139
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
14
reference_url https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E
17
reference_url https://security.netapp.com/advisory/ntap-20180419-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://security.netapp.com/advisory/ntap-20180419-0001/
18
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
19
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
20
reference_url https://www.debian.org/security/2018/dsa-4185
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://www.debian.org/security/2018/dsa-4185
21
reference_url https://www.debian.org/security/2018/dsa-4225
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://www.debian.org/security/2018/dsa-4225
22
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
23
reference_url http://www.securityfocus.com/bid/103872
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url http://www.securityfocus.com/bid/103872
24
reference_url http://www.securitytracker.com/id/1040697
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url http://www.securitytracker.com/id/1040697
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1567542
reference_id 1567542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1567542
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2799
reference_id CVE-2018-2799
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-2799
55
reference_url https://security.gentoo.org/glsa/201903-14
reference_id GLSA-201903-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://security.gentoo.org/glsa/201903-14
56
reference_url https://access.redhat.com/errata/RHSA-2018:1188
reference_id RHSA-2018:1188
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1188
57
reference_url https://access.redhat.com/errata/RHSA-2018:1191
reference_id RHSA-2018:1191
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1191
58
reference_url https://access.redhat.com/errata/RHSA-2018:1201
reference_id RHSA-2018:1201
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1201
59
reference_url https://access.redhat.com/errata/RHSA-2018:1202
reference_id RHSA-2018:1202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1202
60
reference_url https://access.redhat.com/errata/RHSA-2018:1204
reference_id RHSA-2018:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1204
61
reference_url https://access.redhat.com/errata/RHSA-2018:1206
reference_id RHSA-2018:1206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1206
62
reference_url https://access.redhat.com/errata/RHSA-2018:1270
reference_id RHSA-2018:1270
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1270
63
reference_url https://access.redhat.com/errata/RHSA-2018:1278
reference_id RHSA-2018:1278
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1278
64
reference_url https://access.redhat.com/errata/RHSA-2018:1721
reference_id RHSA-2018:1721
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1721
65
reference_url https://access.redhat.com/errata/RHSA-2018:1722
reference_id RHSA-2018:1722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1722
66
reference_url https://access.redhat.com/errata/RHSA-2018:1723
reference_id RHSA-2018:1723
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1723
67
reference_url https://access.redhat.com/errata/RHSA-2018:1724
reference_id RHSA-2018:1724
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1724
68
reference_url https://access.redhat.com/errata/RHSA-2018:1974
reference_id RHSA-2018:1974
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1974
69
reference_url https://access.redhat.com/errata/RHSA-2018:1975
reference_id RHSA-2018:1975
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://access.redhat.com/errata/RHSA-2018:1975
70
reference_url https://usn.ubuntu.com/3644-1/
reference_id USN-3644-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://usn.ubuntu.com/3644-1/
71
reference_url https://usn.ubuntu.com/3691-1/
reference_id USN-3691-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/
url https://usn.ubuntu.com/3691-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2018-2799
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4et-kgqx-qkgy
101
url VCID-zbhh-berx-q3gh
vulnerability_id VCID-zbhh-berx-q3gh
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1504.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://rhn.redhat.com/errata/RHSA-2016-1504.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3610
reference_id
reference_type
scores
0
value 0.04237
scoring_system epss
scoring_elements 0.88785
published_at 2026-04-13T12:55:00Z
1
value 0.04237
scoring_system epss
scoring_elements 0.88729
published_at 2026-04-01T12:55:00Z
2
value 0.04237
scoring_system epss
scoring_elements 0.88738
published_at 2026-04-02T12:55:00Z
3
value 0.04237
scoring_system epss
scoring_elements 0.88755
published_at 2026-04-04T12:55:00Z
4
value 0.04237
scoring_system epss
scoring_elements 0.88757
published_at 2026-04-07T12:55:00Z
5
value 0.04237
scoring_system epss
scoring_elements 0.88774
published_at 2026-04-08T12:55:00Z
6
value 0.04237
scoring_system epss
scoring_elements 0.88778
published_at 2026-04-09T12:55:00Z
7
value 0.04237
scoring_system epss
scoring_elements 0.8879
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3610
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
21
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.securityfocus.com/bid/91787
22
reference_url http://www.securityfocus.com/bid/91930
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.securityfocus.com/bid/91930
23
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.securitytracker.com/id/1036365
24
reference_url http://www.ubuntu.com/usn/USN-3043-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.ubuntu.com/usn/USN-3043-1
25
reference_url http://www.ubuntu.com/usn/USN-3062-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url http://www.ubuntu.com/usn/USN-3062-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1356994
reference_id 1356994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1356994
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3610
reference_id CVE-2016-3610
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3610
35
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url https://security.gentoo.org/glsa/201610-08
36
reference_url https://security.gentoo.org/glsa/201701-43
reference_id GLSA-201701-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url https://security.gentoo.org/glsa/201701-43
37
reference_url https://access.redhat.com/errata/RHSA-2016:1458
reference_id RHSA-2016:1458
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url https://access.redhat.com/errata/RHSA-2016:1458
38
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/
url https://access.redhat.com/errata/RHSA-2016:1475
39
reference_url https://access.redhat.com/errata/RHSA-2016:1504
reference_id RHSA-2016:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1504
40
reference_url https://usn.ubuntu.com/3043-1/
reference_id USN-3043-1
reference_type
scores
url https://usn.ubuntu.com/3043-1/
41
reference_url https://usn.ubuntu.com/3062-1/
reference_id USN-3062-1
reference_type
scores
url https://usn.ubuntu.com/3062-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-3610
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbhh-berx-q3gh
102
url VCID-zzqd-253d-ykca
vulnerability_id VCID-zzqd-253d-ykca
summary
Multiple vulnerabilities have been found in IcedTea, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3509
reference_id
reference_type
scores
0
value 0.00717
scoring_system epss
scoring_elements 0.72418
published_at 2026-04-11T12:55:00Z
1
value 0.00717
scoring_system epss
scoring_elements 0.72389
published_at 2026-04-13T12:55:00Z
2
value 0.00717
scoring_system epss
scoring_elements 0.72402
published_at 2026-04-12T12:55:00Z
3
value 0.00717
scoring_system epss
scoring_elements 0.72343
published_at 2026-04-01T12:55:00Z
4
value 0.00717
scoring_system epss
scoring_elements 0.72367
published_at 2026-04-04T12:55:00Z
5
value 0.00717
scoring_system epss
scoring_elements 0.72344
published_at 2026-04-07T12:55:00Z
6
value 0.00717
scoring_system epss
scoring_elements 0.72383
published_at 2026-04-08T12:55:00Z
7
value 0.00717
scoring_system epss
scoring_elements 0.72395
published_at 2026-04-09T12:55:00Z
8
value 0.00717
scoring_system epss
scoring_elements 0.72348
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.debian.org/security/2017/dsa-3858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url http://www.debian.org/security/2017/dsa-3858
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
11
reference_url http://www.securityfocus.com/bid/97737
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url http://www.securityfocus.com/bid/97737
12
reference_url http://www.securitytracker.com/id/1038286
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url http://www.securitytracker.com/id/1038286
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443052
reference_id 1443052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443052
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3509
reference_id CVE-2017-3509
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3509
21
reference_url https://security.gentoo.org/glsa/201705-03
reference_id GLSA-201705-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://security.gentoo.org/glsa/201705-03
22
reference_url https://security.gentoo.org/glsa/201707-01
reference_id GLSA-201707-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://security.gentoo.org/glsa/201707-01
23
reference_url https://access.redhat.com/errata/RHSA-2017:1108
reference_id RHSA-2017:1108
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1108
24
reference_url https://access.redhat.com/errata/RHSA-2017:1109
reference_id RHSA-2017:1109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1109
25
reference_url https://access.redhat.com/errata/RHSA-2017:1117
reference_id RHSA-2017:1117
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1117
26
reference_url https://access.redhat.com/errata/RHSA-2017:1118
reference_id RHSA-2017:1118
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1118
27
reference_url https://access.redhat.com/errata/RHSA-2017:1119
reference_id RHSA-2017:1119
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1119
28
reference_url https://access.redhat.com/errata/RHSA-2017:1204
reference_id RHSA-2017:1204
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1204
29
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1220
30
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1221
31
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:1222
32
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/
url https://access.redhat.com/errata/RHSA-2017:3453
33
reference_url https://usn.ubuntu.com/3275-1/
reference_id USN-3275-1
reference_type
scores
url https://usn.ubuntu.com/3275-1/
34
reference_url https://usn.ubuntu.com/3275-2/
reference_id USN-3275-2
reference_type
scores
url https://usn.ubuntu.com/3275-2/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2017-3509
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zzqd-253d-ykca
Fixing_vulnerabilities
0
url VCID-1m2k-jt6j-kyam
vulnerability_id VCID-1m2k-jt6j-kyam
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4842
reference_id
reference_type
scores
0
value 0.0308
scoring_system epss
scoring_elements 0.86771
published_at 2026-04-13T12:55:00Z
1
value 0.0308
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-01T12:55:00Z
2
value 0.0308
scoring_system epss
scoring_elements 0.86719
published_at 2026-04-02T12:55:00Z
3
value 0.0308
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-04T12:55:00Z
4
value 0.0308
scoring_system epss
scoring_elements 0.86737
published_at 2026-04-07T12:55:00Z
5
value 0.0308
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-08T12:55:00Z
6
value 0.0308
scoring_system epss
scoring_elements 0.86765
published_at 2026-04-09T12:55:00Z
7
value 0.0308
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-11T12:55:00Z
8
value 0.0308
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4842
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
49
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
50
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
51
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
52
reference_url http://www.securityfocus.com/bid/77154
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77154
53
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
54
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
55
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273425
reference_id 1273425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273425
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4842
reference_id CVE-2015-4842
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4842
66
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
67
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
68
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
69
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
70
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
71
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
72
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
73
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
74
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
75
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
76
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
77
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
78
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
79
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
80
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
81
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4842
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1m2k-jt6j-kyam
1
url VCID-4p3u-gdhr-jucj
vulnerability_id VCID-4p3u-gdhr-jucj
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0402
reference_id
reference_type
scores
0
value 0.03273
scoring_system epss
scoring_elements 0.87168
published_at 2026-04-13T12:55:00Z
1
value 0.03273
scoring_system epss
scoring_elements 0.87172
published_at 2026-04-12T12:55:00Z
2
value 0.03273
scoring_system epss
scoring_elements 0.87113
published_at 2026-04-01T12:55:00Z
3
value 0.03273
scoring_system epss
scoring_elements 0.87123
published_at 2026-04-02T12:55:00Z
4
value 0.03273
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-04T12:55:00Z
5
value 0.03273
scoring_system epss
scoring_elements 0.87137
published_at 2026-04-07T12:55:00Z
6
value 0.03273
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-08T12:55:00Z
7
value 0.03273
scoring_system epss
scoring_elements 0.87165
published_at 2026-04-09T12:55:00Z
8
value 0.03273
scoring_system epss
scoring_elements 0.87178
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0402
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securityfocus.com/bid/81096
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81096
46
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
47
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
48
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298957
reference_id 1298957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298957
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0402
reference_id CVE-2016-0402
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0402
61
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
62
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
63
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
64
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
65
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
66
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
67
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
68
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
69
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
70
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
71
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
72
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
73
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
74
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
75
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
76
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
77
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0402
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj
2
url VCID-5u17-kgsw-akar
vulnerability_id VCID-5u17-kgsw-akar
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4806
reference_id
reference_type
scores
0
value 0.02806
scoring_system epss
scoring_elements 0.86059
published_at 2026-04-01T12:55:00Z
1
value 0.02806
scoring_system epss
scoring_elements 0.8607
published_at 2026-04-02T12:55:00Z
2
value 0.02806
scoring_system epss
scoring_elements 0.86086
published_at 2026-04-04T12:55:00Z
3
value 0.02806
scoring_system epss
scoring_elements 0.86085
published_at 2026-04-07T12:55:00Z
4
value 0.02806
scoring_system epss
scoring_elements 0.86105
published_at 2026-04-08T12:55:00Z
5
value 0.02806
scoring_system epss
scoring_elements 0.86115
published_at 2026-04-09T12:55:00Z
6
value 0.02806
scoring_system epss
scoring_elements 0.86129
published_at 2026-04-11T12:55:00Z
7
value 0.02806
scoring_system epss
scoring_elements 0.86128
published_at 2026-04-12T12:55:00Z
8
value 0.02806
scoring_system epss
scoring_elements 0.86124
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1233687
reference_id 1233687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1233687
26
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
27
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
28
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
29
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
30
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
31
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
32
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
33
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
34
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
35
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
36
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
37
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
38
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
39
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
40
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
41
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
42
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4806
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5u17-kgsw-akar
3
url VCID-6y1r-9shn-abdp
vulnerability_id VCID-6y1r-9shn-abdp
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4805
reference_id
reference_type
scores
0
value 0.06534
scoring_system epss
scoring_elements 0.91073
published_at 2026-04-01T12:55:00Z
1
value 0.06534
scoring_system epss
scoring_elements 0.91079
published_at 2026-04-02T12:55:00Z
2
value 0.06534
scoring_system epss
scoring_elements 0.91087
published_at 2026-04-04T12:55:00Z
3
value 0.06534
scoring_system epss
scoring_elements 0.91096
published_at 2026-04-07T12:55:00Z
4
value 0.06534
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-08T12:55:00Z
5
value 0.06534
scoring_system epss
scoring_elements 0.91114
published_at 2026-04-09T12:55:00Z
6
value 0.06534
scoring_system epss
scoring_elements 0.91122
published_at 2026-04-11T12:55:00Z
7
value 0.06534
scoring_system epss
scoring_elements 0.91123
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4805
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273311
reference_id 1273311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273311
26
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
27
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
28
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
29
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
30
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
31
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
32
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
33
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
34
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
35
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
36
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
37
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
38
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
39
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
40
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
41
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
42
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4805
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6y1r-9shn-abdp
4
url VCID-7y2q-c6xs-nbex
vulnerability_id VCID-7y2q-c6xs-nbex
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4734
reference_id
reference_type
scores
0
value 0.0308
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-01T12:55:00Z
1
value 0.0308
scoring_system epss
scoring_elements 0.86719
published_at 2026-04-02T12:55:00Z
2
value 0.0308
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-04T12:55:00Z
3
value 0.0308
scoring_system epss
scoring_elements 0.86737
published_at 2026-04-07T12:55:00Z
4
value 0.0308
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-08T12:55:00Z
5
value 0.0308
scoring_system epss
scoring_elements 0.86765
published_at 2026-04-09T12:55:00Z
6
value 0.0308
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-11T12:55:00Z
7
value 0.0308
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-12T12:55:00Z
8
value 0.0308
scoring_system epss
scoring_elements 0.86771
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273430
reference_id 1273430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273430
26
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
27
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
28
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
29
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
30
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
31
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
32
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
33
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
34
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
35
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
36
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
37
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
38
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
39
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
40
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
41
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4734
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7y2q-c6xs-nbex
5
url VCID-a326-kbt5-h7bp
vulnerability_id VCID-a326-kbt5-h7bp
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4882
reference_id
reference_type
scores
0
value 0.06584
scoring_system epss
scoring_elements 0.91156
published_at 2026-04-13T12:55:00Z
1
value 0.06584
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-01T12:55:00Z
2
value 0.06584
scoring_system epss
scoring_elements 0.91112
published_at 2026-04-02T12:55:00Z
3
value 0.06584
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-04T12:55:00Z
4
value 0.06584
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-07T12:55:00Z
5
value 0.06584
scoring_system epss
scoring_elements 0.91141
published_at 2026-04-08T12:55:00Z
6
value 0.06584
scoring_system epss
scoring_elements 0.91147
published_at 2026-04-09T12:55:00Z
7
value 0.06584
scoring_system epss
scoring_elements 0.91154
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4882
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
49
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
50
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
51
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
52
reference_url http://www.securityfocus.com/bid/77181
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77181
53
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
54
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
55
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273414
reference_id 1273414
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273414
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4882
reference_id CVE-2015-4882
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4882
66
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
67
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
68
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
69
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
70
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
71
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
72
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
73
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
74
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
75
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
76
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
77
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
78
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
79
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
80
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
81
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4882
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a326-kbt5-h7bp
6
url VCID-au4s-5j9w-nybx
vulnerability_id VCID-au4s-5j9w-nybx
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4835
reference_id
reference_type
scores
0
value 0.04878
scoring_system epss
scoring_elements 0.89575
published_at 2026-04-12T12:55:00Z
1
value 0.04878
scoring_system epss
scoring_elements 0.8953
published_at 2026-04-01T12:55:00Z
2
value 0.04878
scoring_system epss
scoring_elements 0.89533
published_at 2026-04-02T12:55:00Z
3
value 0.04878
scoring_system epss
scoring_elements 0.89547
published_at 2026-04-04T12:55:00Z
4
value 0.04878
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-07T12:55:00Z
5
value 0.04878
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-08T12:55:00Z
6
value 0.04878
scoring_system epss
scoring_elements 0.89569
published_at 2026-04-13T12:55:00Z
7
value 0.04878
scoring_system epss
scoring_elements 0.89577
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4835
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
49
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
50
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
51
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
52
reference_url http://www.securityfocus.com/bid/77148
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77148
53
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
54
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
55
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273022
reference_id 1273022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273022
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4835
reference_id CVE-2015-4835
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4835
66
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
67
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
68
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
69
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
70
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
71
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
72
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
73
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
74
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
75
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
76
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
77
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
78
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
79
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
80
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
81
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4835
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au4s-5j9w-nybx
7
url VCID-b9wa-u375-xuef
vulnerability_id VCID-b9wa-u375-xuef
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4883
reference_id
reference_type
scores
0
value 0.0818
scoring_system epss
scoring_elements 0.92193
published_at 2026-04-13T12:55:00Z
1
value 0.0818
scoring_system epss
scoring_elements 0.92161
published_at 2026-04-01T12:55:00Z
2
value 0.0818
scoring_system epss
scoring_elements 0.92168
published_at 2026-04-02T12:55:00Z
3
value 0.0818
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-04T12:55:00Z
4
value 0.0818
scoring_system epss
scoring_elements 0.92177
published_at 2026-04-07T12:55:00Z
5
value 0.0818
scoring_system epss
scoring_elements 0.92188
published_at 2026-04-08T12:55:00Z
6
value 0.0818
scoring_system epss
scoring_elements 0.92192
published_at 2026-04-09T12:55:00Z
7
value 0.0818
scoring_system epss
scoring_elements 0.92197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4883
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
51
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
52
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
53
reference_url http://www.securityfocus.com/bid/77161
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77161
54
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
55
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
56
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273304
reference_id 1273304
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273304
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4883
reference_id CVE-2015-4883
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4883
67
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
68
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
69
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
70
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
71
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
72
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
73
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
74
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
75
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
76
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
77
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
78
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
79
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
80
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
81
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
82
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
83
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4883
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9wa-u375-xuef
8
url VCID-ds2p-83xe-dfdm
vulnerability_id VCID-ds2p-83xe-dfdm
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4881
reference_id
reference_type
scores
0
value 0.07452
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-13T12:55:00Z
1
value 0.07452
scoring_system epss
scoring_elements 0.91724
published_at 2026-04-01T12:55:00Z
2
value 0.07452
scoring_system epss
scoring_elements 0.91732
published_at 2026-04-02T12:55:00Z
3
value 0.07452
scoring_system epss
scoring_elements 0.91738
published_at 2026-04-04T12:55:00Z
4
value 0.07452
scoring_system epss
scoring_elements 0.91745
published_at 2026-04-07T12:55:00Z
5
value 0.07452
scoring_system epss
scoring_elements 0.91757
published_at 2026-04-08T12:55:00Z
6
value 0.07452
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-09T12:55:00Z
7
value 0.07452
scoring_system epss
scoring_elements 0.91768
published_at 2026-04-11T12:55:00Z
8
value 0.07452
scoring_system epss
scoring_elements 0.9177
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4881
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
38
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
39
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
40
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
41
reference_url http://www.securityfocus.com/bid/77159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77159
42
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
43
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
44
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273027
reference_id 1273027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273027
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4881
reference_id CVE-2015-4881
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4881
55
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
56
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
57
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
58
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
59
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
60
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
61
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
62
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
63
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
64
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
65
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4881
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2p-83xe-dfdm
9
url VCID-e4dr-2bah-k7bp
vulnerability_id VCID-e4dr-2bah-k7bp
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4872
reference_id
reference_type
scores
0
value 0.0356
scoring_system epss
scoring_elements 0.87705
published_at 2026-04-13T12:55:00Z
1
value 0.0356
scoring_system epss
scoring_elements 0.87651
published_at 2026-04-01T12:55:00Z
2
value 0.0356
scoring_system epss
scoring_elements 0.87661
published_at 2026-04-02T12:55:00Z
3
value 0.0356
scoring_system epss
scoring_elements 0.87674
published_at 2026-04-04T12:55:00Z
4
value 0.0356
scoring_system epss
scoring_elements 0.87675
published_at 2026-04-07T12:55:00Z
5
value 0.0356
scoring_system epss
scoring_elements 0.87696
published_at 2026-04-08T12:55:00Z
6
value 0.0356
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-09T12:55:00Z
7
value 0.0356
scoring_system epss
scoring_elements 0.87714
published_at 2026-04-11T12:55:00Z
8
value 0.0356
scoring_system epss
scoring_elements 0.87707
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4872
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
51
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
52
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
53
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
54
reference_url http://www.securityfocus.com/bid/77211
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77211
55
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
56
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
57
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
58
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273734
reference_id 1273734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273734
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4872
reference_id CVE-2015-4872
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4872
69
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
70
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
71
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
72
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
73
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
74
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
75
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
76
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
77
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
78
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
79
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
80
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
81
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
82
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
83
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
84
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
85
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4872
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4dr-2bah-k7bp
10
url VCID-gted-bme5-r7gf
vulnerability_id VCID-gted-bme5-r7gf
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0494
reference_id
reference_type
scores
0
value 0.0867
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-13T12:55:00Z
1
value 0.0867
scoring_system epss
scoring_elements 0.92463
published_at 2026-04-12T12:55:00Z
2
value 0.0867
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-01T12:55:00Z
3
value 0.0867
scoring_system epss
scoring_elements 0.92426
published_at 2026-04-02T12:55:00Z
4
value 0.0867
scoring_system epss
scoring_elements 0.92435
published_at 2026-04-04T12:55:00Z
5
value 0.0867
scoring_system epss
scoring_elements 0.92437
published_at 2026-04-07T12:55:00Z
6
value 0.0867
scoring_system epss
scoring_elements 0.92449
published_at 2026-04-08T12:55:00Z
7
value 0.0867
scoring_system epss
scoring_elements 0.92454
published_at 2026-04-09T12:55:00Z
8
value 0.0867
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0494
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
44
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
45
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
46
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
47
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
48
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
49
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
50
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
51
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298906
reference_id 1298906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298906
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0494
reference_id CVE-2016-0494
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0494
64
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
65
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
66
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
67
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
68
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
69
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
70
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
71
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
72
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
73
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
74
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
75
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
76
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
77
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
78
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
79
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
80
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
81
reference_url https://usn.ubuntu.com/3227-1/
reference_id USN-3227-1
reference_type
scores
url https://usn.ubuntu.com/3227-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0494
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf
11
url VCID-j35a-btuq-83hs
vulnerability_id VCID-j35a-btuq-83hs
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
18
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json
19
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4871
reference_id
reference_type
scores
0
value 0.02398
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-13T12:55:00Z
1
value 0.02398
scoring_system epss
scoring_elements 0.84972
published_at 2026-04-01T12:55:00Z
2
value 0.02398
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-02T12:55:00Z
3
value 0.02398
scoring_system epss
scoring_elements 0.85004
published_at 2026-04-04T12:55:00Z
4
value 0.02398
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-07T12:55:00Z
5
value 0.02398
scoring_system epss
scoring_elements 0.8503
published_at 2026-04-08T12:55:00Z
6
value 0.02398
scoring_system epss
scoring_elements 0.85037
published_at 2026-04-09T12:55:00Z
7
value 0.02398
scoring_system epss
scoring_elements 0.85054
published_at 2026-04-11T12:55:00Z
8
value 0.02398
scoring_system epss
scoring_elements 0.85052
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4871
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871
21
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
22
reference_url http://www.debian.org/security/2015/dsa-3401
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3401
23
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
25
reference_url http://www.securityfocus.com/bid/77238
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77238
26
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
27
reference_url http://www.ubuntu.com/usn/USN-2818-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2818-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273859
reference_id 1273859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273859
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4871
reference_id CVE-2015-4871
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4871
32
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
33
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
34
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
35
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
36
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
37
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
38
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
39
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
40
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
41
reference_url https://usn.ubuntu.com/2818-1/
reference_id USN-2818-1
reference_type
scores
url https://usn.ubuntu.com/2818-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4871
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j35a-btuq-83hs
12
url VCID-jj9j-kwv8-byba
vulnerability_id VCID-jj9j-kwv8-byba
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0466
reference_id
reference_type
scores
0
value 0.04977
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-13T12:55:00Z
1
value 0.04977
scoring_system epss
scoring_elements 0.89696
published_at 2026-04-12T12:55:00Z
2
value 0.04977
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-01T12:55:00Z
3
value 0.04977
scoring_system epss
scoring_elements 0.89651
published_at 2026-04-02T12:55:00Z
4
value 0.04977
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-04T12:55:00Z
5
value 0.04977
scoring_system epss
scoring_elements 0.89668
published_at 2026-04-07T12:55:00Z
6
value 0.04977
scoring_system epss
scoring_elements 0.89684
published_at 2026-04-08T12:55:00Z
7
value 0.04977
scoring_system epss
scoring_elements 0.8969
published_at 2026-04-09T12:55:00Z
8
value 0.04977
scoring_system epss
scoring_elements 0.89698
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0466
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
42
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
43
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
44
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
46
reference_url http://www.securityfocus.com/bid/81118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81118
47
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
48
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
49
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
50
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299385
reference_id 1299385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299385
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0466
reference_id CVE-2016-0466
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0466
62
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
63
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
64
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
65
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
66
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
67
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
68
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
69
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
70
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
71
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
72
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
73
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
74
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
75
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
76
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
77
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
78
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0466
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba
13
url VCID-kahp-6ybn-9yax
vulnerability_id VCID-kahp-6ybn-9yax
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4893
reference_id
reference_type
scores
0
value 0.06584
scoring_system epss
scoring_elements 0.91156
published_at 2026-04-13T12:55:00Z
1
value 0.06584
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-01T12:55:00Z
2
value 0.06584
scoring_system epss
scoring_elements 0.91112
published_at 2026-04-02T12:55:00Z
3
value 0.06584
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-04T12:55:00Z
4
value 0.06584
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-07T12:55:00Z
5
value 0.06584
scoring_system epss
scoring_elements 0.91141
published_at 2026-04-08T12:55:00Z
6
value 0.06584
scoring_system epss
scoring_elements 0.91147
published_at 2026-04-09T12:55:00Z
7
value 0.06584
scoring_system epss
scoring_elements 0.91154
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4893
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
49
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
50
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
51
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
52
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
53
reference_url http://www.securityfocus.com/bid/77207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77207
54
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
55
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
56
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273638
reference_id 1273638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273638
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4893
reference_id CVE-2015-4893
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4893
68
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
69
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
70
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
71
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
72
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
73
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
74
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
75
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
76
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
77
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
78
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
79
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
80
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
81
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
82
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
83
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4893
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kahp-6ybn-9yax
14
url VCID-knv6-1uv9-yfcy
vulnerability_id VCID-knv6-1uv9-yfcy
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4903
reference_id
reference_type
scores
0
value 0.0308
scoring_system epss
scoring_elements 0.86771
published_at 2026-04-13T12:55:00Z
1
value 0.0308
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-01T12:55:00Z
2
value 0.0308
scoring_system epss
scoring_elements 0.86719
published_at 2026-04-02T12:55:00Z
3
value 0.0308
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-04T12:55:00Z
4
value 0.0308
scoring_system epss
scoring_elements 0.86737
published_at 2026-04-07T12:55:00Z
5
value 0.0308
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-08T12:55:00Z
6
value 0.0308
scoring_system epss
scoring_elements 0.86765
published_at 2026-04-09T12:55:00Z
7
value 0.0308
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-11T12:55:00Z
8
value 0.0308
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4903
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
51
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
52
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
53
reference_url http://www.securityfocus.com/bid/77194
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77194
54
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
55
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
56
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273496
reference_id 1273496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273496
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4903
reference_id CVE-2015-4903
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4903
67
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
68
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
69
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
70
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
71
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
72
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
73
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
74
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
75
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
76
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
77
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
78
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
79
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
80
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
81
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
82
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
83
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4903
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knv6-1uv9-yfcy
15
url VCID-nv52-jzcr-37ay
vulnerability_id VCID-nv52-jzcr-37ay
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4860
reference_id
reference_type
scores
0
value 0.0818
scoring_system epss
scoring_elements 0.92193
published_at 2026-04-13T12:55:00Z
1
value 0.0818
scoring_system epss
scoring_elements 0.92161
published_at 2026-04-01T12:55:00Z
2
value 0.0818
scoring_system epss
scoring_elements 0.92168
published_at 2026-04-02T12:55:00Z
3
value 0.0818
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-04T12:55:00Z
4
value 0.0818
scoring_system epss
scoring_elements 0.92177
published_at 2026-04-07T12:55:00Z
5
value 0.0818
scoring_system epss
scoring_elements 0.92188
published_at 2026-04-08T12:55:00Z
6
value 0.0818
scoring_system epss
scoring_elements 0.92192
published_at 2026-04-09T12:55:00Z
7
value 0.0818
scoring_system epss
scoring_elements 0.92197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
51
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
52
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
53
reference_url http://www.securityfocus.com/bid/77162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77162
54
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
55
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
56
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273308
reference_id 1273308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273308
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4860
reference_id CVE-2015-4860
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4860
67
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
68
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
69
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
70
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
71
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
72
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
73
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
74
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
75
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
76
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
77
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
78
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
79
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
80
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
81
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
82
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
83
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4860
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nv52-jzcr-37ay
16
url VCID-qb56-zfz8-4bev
vulnerability_id VCID-qb56-zfz8-4bev
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4844
reference_id
reference_type
scores
0
value 0.10364
scoring_system epss
scoring_elements 0.93202
published_at 2026-04-13T12:55:00Z
1
value 0.10364
scoring_system epss
scoring_elements 0.93173
published_at 2026-04-01T12:55:00Z
2
value 0.10364
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-02T12:55:00Z
3
value 0.10364
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-04T12:55:00Z
4
value 0.10364
scoring_system epss
scoring_elements 0.93185
published_at 2026-04-07T12:55:00Z
5
value 0.10364
scoring_system epss
scoring_elements 0.93194
published_at 2026-04-08T12:55:00Z
6
value 0.10364
scoring_system epss
scoring_elements 0.93198
published_at 2026-04-09T12:55:00Z
7
value 0.10364
scoring_system epss
scoring_elements 0.93203
published_at 2026-04-11T12:55:00Z
8
value 0.10364
scoring_system epss
scoring_elements 0.932
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4844
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
54
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
55
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
56
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
57
reference_url http://www.securityfocus.com/bid/77164
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77164
58
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
59
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
60
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273318
reference_id 1273318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273318
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4844
reference_id CVE-2015-4844
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4844
71
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
72
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
73
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
74
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
75
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
76
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
77
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
78
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
79
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
80
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
81
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
82
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
83
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
84
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
85
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
86
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
87
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
88
reference_url https://usn.ubuntu.com/3227-1/
reference_id USN-3227-1
reference_type
scores
url https://usn.ubuntu.com/3227-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4844
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qb56-zfz8-4bev
17
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
18
url VCID-r691-77bt-skhe
vulnerability_id VCID-r691-77bt-skhe
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4840
reference_id
reference_type
scores
0
value 0.0308
scoring_system epss
scoring_elements 0.86771
published_at 2026-04-13T12:55:00Z
1
value 0.0308
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-01T12:55:00Z
2
value 0.0308
scoring_system epss
scoring_elements 0.86719
published_at 2026-04-02T12:55:00Z
3
value 0.0308
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-04T12:55:00Z
4
value 0.0308
scoring_system epss
scoring_elements 0.86737
published_at 2026-04-07T12:55:00Z
5
value 0.0308
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-08T12:55:00Z
6
value 0.0308
scoring_system epss
scoring_elements 0.86765
published_at 2026-04-09T12:55:00Z
7
value 0.0308
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-11T12:55:00Z
8
value 0.0308
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4840
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
41
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
42
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
44
reference_url http://www.securityfocus.com/bid/77242
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77242
45
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
46
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273338
reference_id 1273338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273338
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4840
reference_id CVE-2015-4840
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4840
55
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
56
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
57
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
58
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
59
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
60
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
61
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
62
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
63
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
64
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
65
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
66
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4840
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r691-77bt-skhe
19
url VCID-t1yx-brps-4yhe
vulnerability_id VCID-t1yx-brps-4yhe
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json
21
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4911
reference_id
reference_type
scores
0
value 0.06584
scoring_system epss
scoring_elements 0.91156
published_at 2026-04-13T12:55:00Z
1
value 0.06584
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-01T12:55:00Z
2
value 0.06584
scoring_system epss
scoring_elements 0.91112
published_at 2026-04-02T12:55:00Z
3
value 0.06584
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-04T12:55:00Z
4
value 0.06584
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-07T12:55:00Z
5
value 0.06584
scoring_system epss
scoring_elements 0.91141
published_at 2026-04-08T12:55:00Z
6
value 0.06584
scoring_system epss
scoring_elements 0.91147
published_at 2026-04-09T12:55:00Z
7
value 0.06584
scoring_system epss
scoring_elements 0.91154
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4911
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
45
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10141
46
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
47
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
48
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
49
reference_url http://www.securityfocus.com/bid/77209
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77209
50
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
51
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
52
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
53
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273645
reference_id 1273645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273645
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4911
reference_id CVE-2015-4911
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4911
64
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
65
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
66
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
67
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
68
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
69
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
70
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
71
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
72
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
73
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
74
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4911
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1yx-brps-4yhe
20
url VCID-u5jr-jf83-gbbb
vulnerability_id VCID-u5jr-jf83-gbbb
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4803
reference_id
reference_type
scores
0
value 0.06584
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-01T12:55:00Z
1
value 0.06584
scoring_system epss
scoring_elements 0.91112
published_at 2026-04-02T12:55:00Z
2
value 0.06584
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-04T12:55:00Z
3
value 0.06584
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-07T12:55:00Z
4
value 0.06584
scoring_system epss
scoring_elements 0.91141
published_at 2026-04-08T12:55:00Z
5
value 0.06584
scoring_system epss
scoring_elements 0.91147
published_at 2026-04-09T12:55:00Z
6
value 0.06584
scoring_system epss
scoring_elements 0.91154
published_at 2026-04-11T12:55:00Z
7
value 0.06584
scoring_system epss
scoring_elements 0.91156
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273637
reference_id 1273637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273637
26
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
27
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
28
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
29
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
30
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
31
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
32
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
33
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
34
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
35
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
36
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
37
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
38
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
39
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
40
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
41
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4803
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5jr-jf83-gbbb
21
url VCID-vf65-ugfc-nueg
vulnerability_id VCID-vf65-ugfc-nueg
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-1919.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1919.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2015-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1920.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2015-1921.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1921.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2015-1926.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1926.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1927.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1928.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1928.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2015-2506.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2506.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2015-2507.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2507.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2015-2508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2508.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2015-2509.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2509.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2015-2518.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2518.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4843
reference_id
reference_type
scores
0
value 0.14057
scoring_system epss
scoring_elements 0.94349
published_at 2026-04-13T12:55:00Z
1
value 0.14057
scoring_system epss
scoring_elements 0.9431
published_at 2026-04-01T12:55:00Z
2
value 0.14057
scoring_system epss
scoring_elements 0.94319
published_at 2026-04-02T12:55:00Z
3
value 0.14057
scoring_system epss
scoring_elements 0.94329
published_at 2026-04-04T12:55:00Z
4
value 0.14057
scoring_system epss
scoring_elements 0.9433
published_at 2026-04-07T12:55:00Z
5
value 0.14057
scoring_system epss
scoring_elements 0.94339
published_at 2026-04-08T12:55:00Z
6
value 0.14057
scoring_system epss
scoring_elements 0.94343
published_at 2026-04-09T12:55:00Z
7
value 0.14057
scoring_system epss
scoring_elements 0.94347
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4843
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url http://www.debian.org/security/2015/dsa-3381
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3381
51
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
52
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
53
reference_url http://www.securityfocus.com/bid/77160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77160
54
reference_url http://www.securitytracker.com/id/1033884
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033884
55
reference_url http://www.ubuntu.com/usn/USN-2784-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2784-1
56
reference_url http://www.ubuntu.com/usn/USN-2827-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2827-1
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1273053
reference_id 1273053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1273053
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4843
reference_id CVE-2015-4843
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4843
67
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
68
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
69
reference_url https://access.redhat.com/errata/RHSA-2015:1919
reference_id RHSA-2015:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1919
70
reference_url https://access.redhat.com/errata/RHSA-2015:1920
reference_id RHSA-2015:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1920
71
reference_url https://access.redhat.com/errata/RHSA-2015:1921
reference_id RHSA-2015:1921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1921
72
reference_url https://access.redhat.com/errata/RHSA-2015:1926
reference_id RHSA-2015:1926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1926
73
reference_url https://access.redhat.com/errata/RHSA-2015:1927
reference_id RHSA-2015:1927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1927
74
reference_url https://access.redhat.com/errata/RHSA-2015:1928
reference_id RHSA-2015:1928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1928
75
reference_url https://access.redhat.com/errata/RHSA-2015:2086
reference_id RHSA-2015:2086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2086
76
reference_url https://access.redhat.com/errata/RHSA-2015:2506
reference_id RHSA-2015:2506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2506
77
reference_url https://access.redhat.com/errata/RHSA-2015:2507
reference_id RHSA-2015:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2507
78
reference_url https://access.redhat.com/errata/RHSA-2015:2508
reference_id RHSA-2015:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2508
79
reference_url https://access.redhat.com/errata/RHSA-2015:2509
reference_id RHSA-2015:2509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2509
80
reference_url https://access.redhat.com/errata/RHSA-2015:2518
reference_id RHSA-2015:2518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2518
81
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
82
reference_url https://usn.ubuntu.com/2784-1/
reference_id USN-2784-1
reference_type
scores
url https://usn.ubuntu.com/2784-1/
83
reference_url https://usn.ubuntu.com/2827-1/
reference_id USN-2827-1
reference_type
scores
url https://usn.ubuntu.com/2827-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
aliases CVE-2015-4843
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vf65-ugfc-nueg
22
url VCID-wbup-e69y-3fgh
vulnerability_id VCID-wbup-e69y-3fgh
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0448
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.56056
published_at 2026-04-13T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.56073
published_at 2026-04-12T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.55919
published_at 2026-04-01T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56031
published_at 2026-04-02T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56051
published_at 2026-04-04T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.5603
published_at 2026-04-07T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.56081
published_at 2026-04-08T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56084
published_at 2026-04-09T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56096
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0448
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securityfocus.com/bid/81123
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81123
46
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
47
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
48
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299073
reference_id 1299073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299073
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0448
reference_id CVE-2016-0448
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0448
60
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
61
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
62
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
63
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
64
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
65
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
66
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
67
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
68
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
69
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
70
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
71
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
72
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
73
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
74
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
75
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
76
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0448
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh
23
url VCID-wqcq-rktw-jyct
vulnerability_id VCID-wqcq-rktw-jyct
summary
Multiple vulnerabilities have been found in IcedTea allowing remote
    attackers to affect confidentiality, integrity, and availability through
    various vectors.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0067.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0067.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0483
reference_id
reference_type
scores
0
value 0.12599
scoring_system epss
scoring_elements 0.93956
published_at 2026-04-13T12:55:00Z
1
value 0.12599
scoring_system epss
scoring_elements 0.93955
published_at 2026-04-11T12:55:00Z
2
value 0.12599
scoring_system epss
scoring_elements 0.93919
published_at 2026-04-01T12:55:00Z
3
value 0.12599
scoring_system epss
scoring_elements 0.93928
published_at 2026-04-02T12:55:00Z
4
value 0.12599
scoring_system epss
scoring_elements 0.93938
published_at 2026-04-04T12:55:00Z
5
value 0.12599
scoring_system epss
scoring_elements 0.9394
published_at 2026-04-07T12:55:00Z
6
value 0.12599
scoring_system epss
scoring_elements 0.93949
published_at 2026-04-08T12:55:00Z
7
value 0.12599
scoring_system epss
scoring_elements 0.93952
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0483
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
40
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
41
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
42
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.securitytracker.com/id/1034715
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034715
46
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
47
reference_url http://www.ubuntu.com/usn/USN-2885-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2885-1
48
reference_url http://www.zerodayinitiative.com/advisories/ZDI-16-032
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-16-032
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299441
reference_id 1299441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299441
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0483
reference_id CVE-2016-0483
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0483
62
reference_url https://security.gentoo.org/glsa/201603-14
reference_id GLSA-201603-14
reference_type
scores
url https://security.gentoo.org/glsa/201603-14
63
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
url https://security.gentoo.org/glsa/201610-08
64
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
65
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
66
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
67
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
68
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
69
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
70
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
71
reference_url https://access.redhat.com/errata/RHSA-2016:0067
reference_id RHSA-2016:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0067
72
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
73
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
74
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
75
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
76
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
77
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
78
reference_url https://usn.ubuntu.com/2885-1/
reference_id USN-2885-1
reference_type
scores
url https://usn.ubuntu.com/2885-1/
fixed_packages
0
url pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
purl pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pew-7np4-vqfu
1
vulnerability VCID-1x1r-hjrb-6ydb
2
vulnerability VCID-1yfj-cdt7-1yhf
3
vulnerability VCID-27zg-g9hc-4bg1
4
vulnerability VCID-2jc9-6xf6-63a6
5
vulnerability VCID-2krr-m59b-77a7
6
vulnerability VCID-2r75-1ccm-d7aw
7
vulnerability VCID-3mqp-7bx4-jbhv
8
vulnerability VCID-3xyb-xeyq-n3dm
9
vulnerability VCID-49z5-4djw-xuav
10
vulnerability VCID-4p3u-gdhr-jucj
11
vulnerability VCID-4ucs-3zp9-rqey
12
vulnerability VCID-4zte-62md-kyd8
13
vulnerability VCID-5jvq-evzj-tfcc
14
vulnerability VCID-5vrc-h4t3-uucb
15
vulnerability VCID-6383-1rzy-9kcr
16
vulnerability VCID-69zc-r9uw-jke5
17
vulnerability VCID-6aph-ab51-2qbt
18
vulnerability VCID-6qtk-xzvb-ubfr
19
vulnerability VCID-6xzp-k5m9-ykbc
20
vulnerability VCID-7d2e-14yp-pkhq
21
vulnerability VCID-7ez7-vdry-wbep
22
vulnerability VCID-8edn-xjyj-9fgf
23
vulnerability VCID-8f22-4b8p-m3aa
24
vulnerability VCID-8t17-88c7-xqcz
25
vulnerability VCID-8vr7-v6d5-gfhw
26
vulnerability VCID-8y3w-1sev-27d4
27
vulnerability VCID-9bbp-mutu-bqbf
28
vulnerability VCID-9yds-dpzg-4ba9
29
vulnerability VCID-a6rq-d1rv-j7dn
30
vulnerability VCID-ar8p-z4ww-wuau
31
vulnerability VCID-awrz-da8u-7ud2
32
vulnerability VCID-b15r-cqd5-rugd
33
vulnerability VCID-b731-snhn-jugu
34
vulnerability VCID-bg39-wvte-83c1
35
vulnerability VCID-bthw-frhn-wqf6
36
vulnerability VCID-c7sa-v6cu-d3ex
37
vulnerability VCID-c9qw-1g2p-qqcr
38
vulnerability VCID-cp95-73tk-2qhc
39
vulnerability VCID-ctd4-2fps-3bfk
40
vulnerability VCID-d4gw-vgm6-qbf3
41
vulnerability VCID-db1c-8scn-buet
42
vulnerability VCID-dtcg-vqnh-kugk
43
vulnerability VCID-e2zb-3859-qfe6
44
vulnerability VCID-e8nm-ey3v-pfga
45
vulnerability VCID-ejfg-8n1t-53b9
46
vulnerability VCID-enkm-4xpy-6bfp
47
vulnerability VCID-fsu1-jy1q-qkh1
48
vulnerability VCID-ft81-49v3-a7cr
49
vulnerability VCID-ftnn-eurn-wydw
50
vulnerability VCID-gceb-nxww-w3f5
51
vulnerability VCID-gfk8-e7xe-17fk
52
vulnerability VCID-gted-bme5-r7gf
53
vulnerability VCID-htzk-vgn5-m7ak
54
vulnerability VCID-hvzr-km7c-cqgz
55
vulnerability VCID-hxb8-qu7h-8bdu
56
vulnerability VCID-j5hg-xy6j-rkgv
57
vulnerability VCID-jccp-8k75-xkhn
58
vulnerability VCID-jh9n-h2qn-pqh3
59
vulnerability VCID-jj9j-kwv8-byba
60
vulnerability VCID-k3pa-xdxn-ubbg
61
vulnerability VCID-k57c-bcn4-zbat
62
vulnerability VCID-kejc-5261-t7c6
63
vulnerability VCID-kw91-zqtv-7kap
64
vulnerability VCID-m84d-m2tw-tyet
65
vulnerability VCID-n1wv-bkbb-gugt
66
vulnerability VCID-n46g-eb9y-9bds
67
vulnerability VCID-nwvg-gjkx-8khw
68
vulnerability VCID-pdv6-xmdk-d3hy
69
vulnerability VCID-ps35-n8f5-uqcr
70
vulnerability VCID-qfam-11ye-tkd8
71
vulnerability VCID-qs1s-6yjm-jye5
72
vulnerability VCID-qup9-qy11-fqhe
73
vulnerability VCID-r1ff-e1sf-eqeg
74
vulnerability VCID-r4tw-jgd7-euet
75
vulnerability VCID-r7cu-ewk5-pygd
76
vulnerability VCID-rf14-48vb-w7gh
77
vulnerability VCID-rgf4-rwp5-dqd7
78
vulnerability VCID-rvvx-ed8u-auc5
79
vulnerability VCID-rxem-v2fe-jfde
80
vulnerability VCID-snqh-ebq3-hubn
81
vulnerability VCID-ssf2-jqkb-3qgw
82
vulnerability VCID-taqg-ukr5-ybbk
83
vulnerability VCID-tc8v-xrjj-hucq
84
vulnerability VCID-u1c5-pgk4-8bcj
85
vulnerability VCID-u3rj-qyrr-vkbw
86
vulnerability VCID-uc2v-fweb-cfew
87
vulnerability VCID-upyj-tdcf-8kbe
88
vulnerability VCID-v64t-4c46-3bhj
89
vulnerability VCID-v6ym-2522-fqgd
90
vulnerability VCID-vu44-899q-6kct
91
vulnerability VCID-w83z-5wt6-j3fz
92
vulnerability VCID-wbup-e69y-3fgh
93
vulnerability VCID-wcc9-n2hm-87fx
94
vulnerability VCID-wchf-kwep-7khm
95
vulnerability VCID-wjun-m9my-5qbb
96
vulnerability VCID-wqcq-rktw-jyct
97
vulnerability VCID-xqrm-1bu9-abfe
98
vulnerability VCID-xx3g-udjr-7yep
99
vulnerability VCID-y34y-ewv6-fkhb
100
vulnerability VCID-z4et-kgqx-qkgy
101
vulnerability VCID-zbhh-berx-q3gh
102
vulnerability VCID-zzqd-253d-ykca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1
1
url pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
purl pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1
aliases CVE-2016-0483
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1