{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","type":"ebuild","namespace":"dev-java","name":"oracle-jdk-bin","version":"1.8.0.101","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.8.0.111","latest_non_vulnerable_version":"1.8.0.202","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38560?format=json","vulnerability_id":"VCID-142k-d9mj-1kcj","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13105","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13089","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13013","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13091","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13079","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13076","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13088","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516","reference_id":"1357516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485","reference_id":"CVE-2016-3485","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3485"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50862?format=json","vulnerability_id":"VCID-26wp-rmjk-huc8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3498","reference_id":"","reference_type":"","scores":[{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92011","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91973","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91994","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92003","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.92004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91955","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91956","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securityfocus.com/bid/91956"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358170","reference_id":"1358170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358170"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419","reference_id":"832419","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3498","reference_id":"CVE-2016-3498","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3498"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3498"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26wp-rmjk-huc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=json","vulnerability_id":"VCID-2krr-m59b-77a7","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598","reference_id":"","reference_type":"","scores":[{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91582","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91572","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91574","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91564","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.91482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07073","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91918","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securityfocus.com/bid/91918"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971","reference_id":"1356971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598","reference_id":"CVE-2016-3598","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3598"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31319?format=json","vulnerability_id":"VCID-4p3u-gdhr-jucj","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0402","reference_id":"","reference_type":"","scores":[{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87273","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87258","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87208","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87232","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87244","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03273","scoring_system":"epss","scoring_elements":"0.87263","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3458","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3458"},{"reference_url":"http://www.debian.org/security/2016/dsa-3465","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3465"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/81096","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81096"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"http://www.ubuntu.com/usn/USN-2884-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2884-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2885-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2885-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298957","reference_id":"1298957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298957"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0402","reference_id":"CVE-2016-0402","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0402"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0056","reference_id":"RHSA-2016:0056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0057","reference_id":"RHSA-2016:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0067","reference_id":"RHSA-2016:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0099","reference_id":"RHSA-2016:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0100","reference_id":"RHSA-2016:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0101","reference_id":"RHSA-2016:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2884-1/","reference_id":"USN-2884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2884-1/"},{"reference_url":"https://usn.ubuntu.com/2885-1/","reference_id":"USN-2885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0402"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38557?format=json","vulnerability_id":"VCID-cp95-73tk-2qhc","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3458","reference_id":"","reference_type":"","scores":[{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85669","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.8557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85604","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85644","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85662","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85656","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02572","scoring_system":"epss","scoring_elements":"0.85508","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91945","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securityfocus.com/bid/91945"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357494","reference_id":"1357494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357494"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3458","reference_id":"CVE-2016-3458","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3458"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3458"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cp95-73tk-2qhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38570?format=json","vulnerability_id":"VCID-e8nm-ey3v-pfga","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3550","reference_id":"","reference_type":"","scores":[{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83439","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.8332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.8335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83356","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83402","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83422","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83423","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01909","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91951","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securityfocus.com/bid/91951"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357506","reference_id":"1357506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3550","reference_id":"CVE-2016-3550","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3550"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3550"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8nm-ey3v-pfga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31325?format=json","vulnerability_id":"VCID-gted-bme5-r7gf","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0494","reference_id":"","reference_type":"","scores":[{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.9242","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92474","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0867","scoring_system":"epss","scoring_elements":"0.92504","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3458","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3458"},{"reference_url":"http://www.debian.org/security/2016/dsa-3465","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3465"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"http://www.ubuntu.com/usn/USN-2884-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2884-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2885-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2885-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298906","reference_id":"1298906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298906"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0494","reference_id":"CVE-2016-0494","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0494"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0056","reference_id":"RHSA-2016:0056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0057","reference_id":"RHSA-2016:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0067","reference_id":"RHSA-2016:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0099","reference_id":"RHSA-2016:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0100","reference_id":"RHSA-2016:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0101","reference_id":"RHSA-2016:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2884-1/","reference_id":"USN-2884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2884-1/"},{"reference_url":"https://usn.ubuntu.com/2885-1/","reference_id":"USN-2885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2885-1/"},{"reference_url":"https://usn.ubuntu.com/3227-1/","reference_id":"USN-3227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0494"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31322?format=json","vulnerability_id":"VCID-jj9j-kwv8-byba","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0466","reference_id":"","reference_type":"","scores":[{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89759","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89648","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.8969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89689","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89705","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89742","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04977","scoring_system":"epss","scoring_elements":"0.89753","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10148","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10148"},{"reference_url":"http://www.debian.org/security/2016/dsa-3458","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3458"},{"reference_url":"http://www.debian.org/security/2016/dsa-3465","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3465"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/81118","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81118"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"http://www.ubuntu.com/usn/USN-2884-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2884-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2885-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2885-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299385","reference_id":"1299385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299385"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0466","reference_id":"CVE-2016-0466","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0466"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0056","reference_id":"RHSA-2016:0056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0057","reference_id":"RHSA-2016:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0067","reference_id":"RHSA-2016:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0099","reference_id":"RHSA-2016:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0100","reference_id":"RHSA-2016:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0101","reference_id":"RHSA-2016:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2884-1/","reference_id":"USN-2884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2884-1/"},{"reference_url":"https://usn.ubuntu.com/2885-1/","reference_id":"USN-2885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0466"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50859?format=json","vulnerability_id":"VCID-ksrm-h8p3-97dv","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0475","reference_id":"","reference_type":"","scores":[{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7516","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75151","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75017","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74993","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75074","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7511","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75118","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75145","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75169","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0475"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10148","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10148"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298949","reference_id":"1298949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298949"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0475","reference_id":"CVE-2016-0475","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0475"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0475"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksrm-h8p3-97dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38574?format=json","vulnerability_id":"VCID-mut6-yca2-sud8","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3587","reference_id":"","reference_type":"","scores":[{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90805","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.9068","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.9073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90742","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90767","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90797","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90795","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90695","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06034","scoring_system":"epss","scoring_elements":"0.90715","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3587"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91904","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securityfocus.com/bid/91904"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356987","reference_id":"1356987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3587","reference_id":"CVE-2016-3587","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3587"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3587"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mut6-yca2-sud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50860?format=json","vulnerability_id":"VCID-my4w-m69q-gfak","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0603","reference_id":"","reference_type":"","scores":[{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86667","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.8658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86659","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0603"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Feb/54","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Feb/54"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160217-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20160217-0001/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html"},{"reference_url":"http://www.securityfocus.com/archive/1/537462/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/537462/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/83008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83008"},{"reference_url":"http://www.securitytracker.com/id/1034969","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034969"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0603","reference_id":"CVE-2016-0603","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0603"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0603"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-my4w-m69q-gfak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50863?format=json","vulnerability_id":"VCID-n6gk-phrw-cbbw","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3503","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25081","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25189","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25135","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25063","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25262","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91996","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securityfocus.com/bid/91996"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358169","reference_id":"1358169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358169"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3503","reference_id":"CVE-2016-3503","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3503"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3503"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gk-phrw-cbbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50865?format=json","vulnerability_id":"VCID-pynq-sbec-akf8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3552","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17814","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17825","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17714","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17777","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1787","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/92000","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securityfocus.com/bid/92000"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358167","reference_id":"1358167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358167"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3552","reference_id":"CVE-2016-3552","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3552"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3552"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pynq-sbec-akf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=json","vulnerability_id":"VCID-qp1y-5scd-c7hy","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23137","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91990","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91990"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168","reference_id":"1358168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511","reference_id":"CVE-2016-3511","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3511"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38567?format=json","vulnerability_id":"VCID-r1ff-e1sf-eqeg","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3508","reference_id":"","reference_type":"","scores":[{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.9278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92858","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92851","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92847","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92835","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.9281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0942","scoring_system":"epss","scoring_elements":"0.92775","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91972","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securityfocus.com/bid/91972"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357015","reference_id":"1357015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357015"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3508","reference_id":"CVE-2016-3508","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3508"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3508"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ff-e1sf-eqeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38564?format=json","vulnerability_id":"VCID-ssf2-jqkb-3qgw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3500","reference_id":"","reference_type":"","scores":[{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93715","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.9365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93682","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.9368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93699","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93708","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93709","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11609","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357008","reference_id":"1357008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357008"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3500","reference_id":"CVE-2016-3500","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3500"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3500"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssf2-jqkb-3qgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=json","vulnerability_id":"VCID-taqg-ukr5-ybbk","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0650.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0651.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426","reference_id":"","reference_type":"","scores":[{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80888","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01446","scoring_system":"epss","scoring_elements":"0.80844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81635","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/86449","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securityfocus.com/bid/86449"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.ubuntu.com/usn/USN-2963-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"http://www.ubuntu.com/usn/USN-2963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059","reference_id":"1328059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426","reference_id":"CVE-2016-3426","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0650","reference_id":"RHSA-2016:0650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0651","reference_id":"RHSA-2016:0651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/2963-1/","reference_id":"USN-2963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3426"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38581?format=json","vulnerability_id":"VCID-upyj-tdcf-8kbe","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1776.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3606","reference_id":"","reference_type":"","scores":[{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88324","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.8828","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88271","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88409","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88396","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88398","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88386","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.8837","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88359","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.8834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03931","scoring_system":"epss","scoring_elements":"0.88327","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3641","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.debian.org/security/2016/dsa-3641"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91912","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securityfocus.com/bid/91912"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3077-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"http://www.ubuntu.com/usn/USN-3077-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356963","reference_id":"1356963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356963"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3606","reference_id":"CVE-2016-3606","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3606"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1776","reference_id":"RHSA-2016:1776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1776"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"},{"reference_url":"https://usn.ubuntu.com/3077-1/","reference_id":"USN-3077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3606"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upyj-tdcf-8kbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30935?format=json","vulnerability_id":"VCID-v6ym-2522-fqgd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0511.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0511.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0512.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0512.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0513.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0513.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0514.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0514.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0515.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0515.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0516.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0516.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0636","reference_id":"","reference_type":"","scores":[{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94148","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94108","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94109","published_at":"2026-04-24T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.9411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94116","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94128","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94139","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94144","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94067","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.9407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13022","scoring_system":"epss","scoring_elements":"0.94083","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160328-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160328-0001/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3558","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.debian.org/security/2016/dsa-3558"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85376","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.securityfocus.com/bid/85376"},{"reference_url":"http://www.securitytracker.com/id/1035401","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.securitytracker.com/id/1035401"},{"reference_url":"http://www.ubuntu.com/usn/USN-2942-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"http://www.ubuntu.com/usn/USN-2942-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320650","reference_id":"1320650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320650"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0636","reference_id":"CVE-2016-0636","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0636"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0511","reference_id":"RHSA-2016:0511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0512","reference_id":"RHSA-2016:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0513","reference_id":"RHSA-2016:0513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0514","reference_id":"RHSA-2016:0514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0515","reference_id":"RHSA-2016:0515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0516","reference_id":"RHSA-2016:0516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0516"},{"reference_url":"https://usn.ubuntu.com/2942-1/","reference_id":"USN-2942-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2942-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0636"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6ym-2522-fqgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31321?format=json","vulnerability_id":"VCID-wbup-e69y-3fgh","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0448","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56016","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55919","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55983","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56044","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3458","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3458"},{"reference_url":"http://www.debian.org/security/2016/dsa-3465","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3465"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/81123","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81123"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"http://www.ubuntu.com/usn/USN-2884-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2884-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2885-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2885-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299073","reference_id":"1299073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299073"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0448","reference_id":"CVE-2016-0448","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0448"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0056","reference_id":"RHSA-2016:0056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0057","reference_id":"RHSA-2016:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0067","reference_id":"RHSA-2016:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0099","reference_id":"RHSA-2016:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0100","reference_id":"RHSA-2016:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0101","reference_id":"RHSA-2016:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2884-1/","reference_id":"USN-2884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2884-1/"},{"reference_url":"https://usn.ubuntu.com/2885-1/","reference_id":"USN-2885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0448"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31324?format=json","vulnerability_id":"VCID-wqcq-rktw-jyct","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0067.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0483","reference_id":"","reference_type":"","scores":[{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.94017","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.94013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93919","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93972","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93977","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.9398","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93979","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.93999","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12599","scoring_system":"epss","scoring_elements":"0.94009","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3458","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3458"},{"reference_url":"http://www.debian.org/security/2016/dsa-3465","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3465"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securitytracker.com/id/1034715","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034715"},{"reference_url":"http://www.ubuntu.com/usn/USN-2884-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2884-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2885-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2885-1"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-032","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-032"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299441","reference_id":"1299441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299441"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0483","reference_id":"CVE-2016-0483","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0483"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0049","reference_id":"RHSA-2016:0049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0050","reference_id":"RHSA-2016:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0055","reference_id":"RHSA-2016:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0056","reference_id":"RHSA-2016:0056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0057","reference_id":"RHSA-2016:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0067","reference_id":"RHSA-2016:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0098","reference_id":"RHSA-2016:0098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0099","reference_id":"RHSA-2016:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0100","reference_id":"RHSA-2016:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0101","reference_id":"RHSA-2016:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2884-1/","reference_id":"USN-2884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2884-1/"},{"reference_url":"https://usn.ubuntu.com/2885-1/","reference_id":"USN-2885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-0483"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38585?format=json","vulnerability_id":"VCID-zbhh-berx-q3gh","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3610","reference_id":"","reference_type":"","scores":[{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.8879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.8881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88825","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88842","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88854","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.8885","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04237","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91930","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securityfocus.com/bid/91930"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"http://www.ubuntu.com/usn/USN-3043-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.ubuntu.com/usn/USN-3043-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3062-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"http://www.ubuntu.com/usn/USN-3062-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356994","reference_id":"1356994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3610","reference_id":"CVE-2016-3610","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3610"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1458","reference_id":"RHSA-2016:1458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1504","reference_id":"RHSA-2016:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1504"},{"reference_url":"https://usn.ubuntu.com/3043-1/","reference_id":"USN-3043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3043-1/"},{"reference_url":"https://usn.ubuntu.com/3062-1/","reference_id":"USN-3062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78997?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}],"aliases":["CVE-2016-3610"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbhh-berx-q3gh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"}