{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","type":"ebuild","namespace":"dev-java","name":"icedtea-bin","version":"3.2.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.4.0","latest_non_vulnerable_version":"8.252_p09","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38560?format=json","vulnerability_id":"VCID-142k-d9mj-1kcj","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13088","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13076","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13139","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516","reference_id":"1357516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485","reference_id":"CVE-2016-3485","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3485"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38597?format=json","vulnerability_id":"VCID-1pew-7np4-vqfu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597","reference_id":"","reference_type":"","scores":[{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103","reference_id":"1386103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103"},{"reference_url":"http://www.securityfocus.com/bid/93636","reference_id":"93636","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securityfocus.com/bid/93636"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5597"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=json","vulnerability_id":"VCID-2krr-m59b-77a7","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598","reference_id":"","reference_type":"","scores":[{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91918","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91918"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971","reference_id":"1356971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598","reference_id":"CVE-2016-3598","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3598"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38594?format=json","vulnerability_id":"VCID-9p9b-qh1v-gkcp","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5568","reference_id":"","reference_type":"","scores":[{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75951","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5568"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386112","reference_id":"1386112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386112"},{"reference_url":"http://www.securityfocus.com/bid/93621","reference_id":"93621","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"http://www.securityfocus.com/bid/93621"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5568"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9p9b-qh1v-gkcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38592?format=json","vulnerability_id":"VCID-b15r-cqd5-rugd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714","reference_id":"1385714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714"},{"reference_url":"http://www.securityfocus.com/bid/93637","reference_id":"93637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securityfocus.com/bid/93637"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5554"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38557?format=json","vulnerability_id":"VCID-cp95-73tk-2qhc","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3458","reference_id":"","reference_type":"","scores":[{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85488","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91945","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securityfocus.com/bid/91945"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357494","reference_id":"1357494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357494"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3458","reference_id":"CVE-2016-3458","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3458"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3458"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cp95-73tk-2qhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38570?format=json","vulnerability_id":"VCID-e8nm-ey3v-pfga","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3550","reference_id":"","reference_type":"","scores":[{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83229","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91951","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securityfocus.com/bid/91951"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357506","reference_id":"1357506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3550","reference_id":"CVE-2016-3550","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3550"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3550"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8nm-ey3v-pfga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38574?format=json","vulnerability_id":"VCID-mut6-yca2-sud8","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3587","reference_id":"","reference_type":"","scores":[{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.9068","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90695","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.9073","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3587"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91904","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securityfocus.com/bid/91904"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356987","reference_id":"1356987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3587","reference_id":"CVE-2016-3587","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3587"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3587"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mut6-yca2-sud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38595?format=json","vulnerability_id":"VCID-n1wv-bkbb-gugt","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573","reference_id":"","reference_type":"","scores":[{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544","reference_id":"1385544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544"},{"reference_url":"http://www.securityfocus.com/bid/93628","reference_id":"93628","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securityfocus.com/bid/93628"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5573"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38567?format=json","vulnerability_id":"VCID-r1ff-e1sf-eqeg","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3508","reference_id":"","reference_type":"","scores":[{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92775","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.9278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91972","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securityfocus.com/bid/91972"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357015","reference_id":"1357015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357015"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3508","reference_id":"CVE-2016-3508","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3508"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3508"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ff-e1sf-eqeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38596?format=json","vulnerability_id":"VCID-rxem-v2fe-jfde","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5582","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88825","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88862","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385402","reference_id":"1385402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385402"},{"reference_url":"http://www.securityfocus.com/bid/93623","reference_id":"93623","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.securityfocus.com/bid/93623"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5582"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxem-v2fe-jfde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38564?format=json","vulnerability_id":"VCID-ssf2-jqkb-3qgw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3500","reference_id":"","reference_type":"","scores":[{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.9365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93649","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357008","reference_id":"1357008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357008"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3500","reference_id":"CVE-2016-3500","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3500"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3500"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssf2-jqkb-3qgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38589?format=json","vulnerability_id":"VCID-u3rj-qyrr-vkbw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723","reference_id":"1385723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723"},{"reference_url":"http://www.securityfocus.com/bid/93643","reference_id":"93643","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securityfocus.com/bid/93643"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-5542"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38581?format=json","vulnerability_id":"VCID-upyj-tdcf-8kbe","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3606","reference_id":"","reference_type":"","scores":[{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88271","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.8828","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88324","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88335","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91912","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securityfocus.com/bid/91912"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356963","reference_id":"1356963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356963"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3606","reference_id":"CVE-2016-3606","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3606"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3606"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upyj-tdcf-8kbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38585?format=json","vulnerability_id":"VCID-zbhh-berx-q3gh","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3610","reference_id":"","reference_type":"","scores":[{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.8879","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91930","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securityfocus.com/bid/91930"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356994","reference_id":"1356994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3610","reference_id":"CVE-2016-3610","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3610"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75299?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@3.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75300?format=json","purl":"pkg:ebuild/dev-java/icedtea-bin@7.2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.8"}],"aliases":["CVE-2016-3610"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbhh-berx-q3gh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.2.0"}