{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","type":"deb","namespace":"debian","name":"openjdk-8","version":"0","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7u95-2.6.4-1","latest_non_vulnerable_version":"8u492-ga-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42568?format=json","vulnerability_id":"VCID-13cc-fgdq-jygw","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6493","reference_id":"","reference_type":"","scores":[{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92985","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.9292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92974","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92977","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6493"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70468","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70468"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152760","reference_id":"1152760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152760"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6493","reference_id":"CVE-2014-6493","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6493"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6493"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13cc-fgdq-jygw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38560?format=json","vulnerability_id":"VCID-142k-d9mj-1kcj","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13105","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13089","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13013","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13091","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13079","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13076","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13088","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3485"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10166"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516","reference_id":"1357516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357516"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485","reference_id":"CVE-2016-3485","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3485"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3485"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79994?format=json","vulnerability_id":"VCID-1cfu-xjj6-tfcw","summary":"JDK: unspecified vulnerability fixed in 8u311 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35560","reference_id":"","reference_type":"","scores":[{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.7062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.7061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70626","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00675","scoring_system":"epss","scoring_elements":"0.71597","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00675","scoring_system":"epss","scoring_elements":"0.71531","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00675","scoring_system":"epss","scoring_elements":"0.71566","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00675","scoring_system":"epss","scoring_elements":"0.71601","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00675","scoring_system":"epss","scoring_elements":"0.71568","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027731","reference_id":"2027731","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027731"},{"reference_url":"https://security.archlinux.org/AVG-2482","reference_id":"AVG-2482","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2021-35560"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1cfu-xjj6-tfcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43654?format=json","vulnerability_id":"VCID-1d8b-g1b7-33dn","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2811","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36542","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36575","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36602","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3652","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36504","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2811"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180419-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180419-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.securityfocus.com/bid/103810","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/103810"},{"reference_url":"http://www.securitytracker.com/id/1040697","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040697"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569203","reference_id":"1569203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569203"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2811","reference_id":"CVE-2018-2811","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"},{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2811"},{"reference_url":"https://security.gentoo.org/glsa/201903-14","reference_id":"GLSA-201903-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1202","reference_id":"RHSA-2018:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1204","reference_id":"RHSA-2018:1204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1204"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2811"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1d8b-g1b7-33dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42559?format=json","vulnerability_id":"VCID-1e6n-3kbt-xucw","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6456","reference_id":"","reference_type":"","scores":[{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91543","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.9156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91566","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91591","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91601","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91598","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6456"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70522","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70522"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152758","reference_id":"1152758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152758"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6456","reference_id":"CVE-2014-6456","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6456"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6456"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6n-3kbt-xucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30942?format=json","vulnerability_id":"VCID-2v3q-7u91-syh3","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443","reference_id":"","reference_type":"","scores":[{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86667","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86636","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03399","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86482","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securityfocus.com/bid/86482"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618","reference_id":"1328618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443","reference_id":"CVE-2016-3443","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3443"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42575?format=json","vulnerability_id":"VCID-36hf-zrgy-cqda","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6513","reference_id":"","reference_type":"","scores":[{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90856","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.9073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90768","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.9078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.9082","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90839","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90849","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06096","scoring_system":"epss","scoring_elements":"0.90846","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6513"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://secunia.com/advisories/61629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61629"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70569","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70569"},{"reference_url":"http://www.ubuntu.com/usn/USN-2386-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2386-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2388-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2388-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2388-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2388-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1150118","reference_id":"1150118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1150118"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6513","reference_id":"CVE-2014-6513","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6513"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://usn.ubuntu.com/2388-2/","reference_id":"USN-2388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2388-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6513"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36hf-zrgy-cqda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83286?format=json","vulnerability_id":"VCID-3jv7-ceaz-87cb","summary":"JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2940.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2940","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50477","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5046","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50601","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50488","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50492","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50446","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50544","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50554","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50596","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2940"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104768","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"http://www.securityfocus.com/bid/104768"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602146","reference_id":"1602146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602146"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_id":"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2940","reference_id":"CVE-2018-2940","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2253","reference_id":"RHSA-2018:2253","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2254","reference_id":"RHSA-2018:2254","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2255","reference_id":"RHSA-2018:2255","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2256","reference_id":"RHSA-2018:2256","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2568","reference_id":"RHSA-2018:2568","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2569","reference_id":"RHSA-2018:2569","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2575","reference_id":"RHSA-2018:2575","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2576","reference_id":"RHSA-2018:2576","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2712","reference_id":"RHSA-2018:2712","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2713","reference_id":"RHSA-2018:2713","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3007","reference_id":"RHSA-2018:3007","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3008","reference_id":"RHSA-2018:3008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:11:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3008"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2940"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jv7-ceaz-87cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50869?format=json","vulnerability_id":"VCID-45wy-ban5-qqg8","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which can be remotely exploited without\n    authentication.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10309","reference_id":"","reference_type":"","scores":[{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82958","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.8288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82945","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82943","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82808","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10309"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0001/"},{"reference_url":"https://www.exploit-db.com/exploits/43103/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://www.exploit-db.com/exploits/43103/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101328","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.securityfocus.com/bid/101328"},{"reference_url":"http://www.securitytracker.com/id/1039596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.securitytracker.com/id/1039596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503319","reference_id":"1503319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503319"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py","reference_id":"CVE-2017-10309","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10309","reference_id":"CVE-2017-10309","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10309"},{"reference_url":"http://srcincite.io/advisories/src-2017-0028/","reference_id":"CVE-2017-10309","reference_type":"exploit","scores":[],"url":"http://srcincite.io/advisories/src-2017-0028/"},{"reference_url":"https://security.gentoo.org/glsa/201710-31","reference_id":"GLSA-201710-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://security.gentoo.org/glsa/201710-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2999","reference_id":"RHSA-2017:2999","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3264","reference_id":"RHSA-2017:3264","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3267","reference_id":"RHSA-2017:3267","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3453","reference_id":"RHSA-2017:3453","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3453"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-10309"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45wy-ban5-qqg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81946?format=json","vulnerability_id":"VCID-4fz7-854p-3qa5","summary":"OpenJDK: FilePermission checks not preformed correctly on Windows (Libraries, 8213429)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2933","reference_id":"","reference_type":"","scores":[{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66405","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.662","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.6624","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.6631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66325","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66412","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66384","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66237","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66324","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2933"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:00Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777981","reference_id":"1777981","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777981"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2933","reference_id":"CVE-2019-2933","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2933"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2933"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fz7-854p-3qa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60252?format=json","vulnerability_id":"VCID-5y7y-27dr-87g9","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3512","reference_id":"","reference_type":"","scores":[{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89923","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89909","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.8982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97727","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"}],"url":"http://www.securityfocus.com/bid/97727"},{"reference_url":"http://www.securitytracker.com/id/1038286","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"}],"url":"http://www.securitytracker.com/id/1038286"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443455","reference_id":"1443455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443455"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3512","reference_id":"CVE-2017-3512","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3512"},{"reference_url":"https://security.gentoo.org/glsa/201705-03","reference_id":"GLSA-201705-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"}],"url":"https://security.gentoo.org/glsa/201705-03"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:49Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-3512"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-27dr-87g9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354154?format=json","vulnerability_id":"VCID-6fce-bys3-kkgm","summary":"openjdk: OpenJDK: Update LibPNG (Oracle CPU 2026-04)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460045","reference_id":"2460045","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460045"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2026-22020"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fce-bys3-kkgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42563?format=json","vulnerability_id":"VCID-6gh4-5buw-1ydb","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6466","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29784","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3032","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29822","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29763","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6466"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70484","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152762","reference_id":"1152762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152762"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6466","reference_id":"CVE-2014-6466","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6466"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6466"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6gh4-5buw-1ydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50801?format=json","vulnerability_id":"VCID-6mq4-munv-sffc","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2697.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2697","reference_id":"","reference_type":"","scores":[{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.8851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88582","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0408","scoring_system":"epss","scoring_elements":"0.88527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07623","scoring_system":"epss","scoring_elements":"0.91896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08919","scoring_system":"epss","scoring_elements":"0.92631","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08919","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08919","scoring_system":"epss","scoring_elements":"0.92618","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08919","scoring_system":"epss","scoring_elements":"0.92637","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1704480","reference_id":"1704480","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1704480"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1777","reference_id":"CVE-2019-2697","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1777"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt","reference_id":"CVE-2019-2697","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46722.txt"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03959en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us"},{"reference_url":"https://security.gentoo.org/glsa/201908-10","reference_id":"GLSA-201908-10","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://security.gentoo.org/glsa/201908-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1163","reference_id":"RHSA-2019:1163","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1164","reference_id":"RHSA-2019:1164","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1165","reference_id":"RHSA-2019:1165","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1166","reference_id":"RHSA-2019:1166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1238","reference_id":"RHSA-2019:1238","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1325","reference_id":"RHSA-2019:1325","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1325"},{"reference_url":"https://usn.ubuntu.com/3975-1/","reference_id":"USN-3975-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:46Z/"}],"url":"https://usn.ubuntu.com/3975-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2697"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6mq4-munv-sffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40163?format=json","vulnerability_id":"VCID-6q6b-qa23-dyge","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0413","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26968","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26926","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28691","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28539","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.286","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28621","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28544","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28565","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0413"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184278","reference_id":"1184278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184278"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0413"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q6b-qa23-dyge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82870?format=json","vulnerability_id":"VCID-73ad-ngrz-6uee","summary":"JDK: unspecified vulnerability fixed in 8u201 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2449","reference_id":"","reference_type":"","scores":[{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85237","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85169","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85208","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.8508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85121","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.8514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85142","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02418","scoring_system":"epss","scoring_elements":"0.85163","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190118-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190118-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"http://www.securityfocus.com/bid/106597","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"http://www.securityfocus.com/bid/106597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685601","reference_id":"1685601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685601"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2449","reference_id":"CVE-2019-2449","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2449"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0469","reference_id":"RHSA-2019:0469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0472","reference_id":"RHSA-2019:0472","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0640","reference_id":"RHSA-2019:0640","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1238","reference_id":"RHSA-2019:1238","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1238"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2449"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73ad-ngrz-6uee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34337?format=json","vulnerability_id":"VCID-7jyy-8x35-wbba","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2432","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46067","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46187","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46243","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46173","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46081","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46038","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46178","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2432"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1994980","reference_id":"1994980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1994980"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210723-0002/","reference_id":"ntap-20210723-0002","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210723-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3293","reference_id":"RHSA-2021:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3293"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2021-2432"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34725?format=json","vulnerability_id":"VCID-7zbp-hqrr-zfh8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0484","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7943","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79452","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79469","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79488","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211773","reference_id":"1211773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211773"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0484"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7zbp-hqrr-zfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267310?format=json","vulnerability_id":"VCID-8ad6-fezd-efdn","summary":"Vulnerability in Oracle Java SE (component: Install).   The supported version that is affected is Oracle Java SE: 8u451. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE executes to compromise Oracle Java SE.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Java SE. Note: Applies to installation process on client deployment of Java. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50063","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17256","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18892","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18782","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18819","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18716","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36772","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50063"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:16Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2025-50063"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ad6-fezd-efdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34733?format=json","vulnerability_id":"VCID-8b8r-rdb7-7bed","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2627","reference_id":"","reference_type":"","scores":[{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82533","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.8266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.8267","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82694","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82715","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82734","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82749","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243291","reference_id":"1243291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243291"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2627"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8b8r-rdb7-7bed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83285?format=json","vulnerability_id":"VCID-8gea-2k69-cbdk","summary":"JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2973","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48413","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48425","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48351","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48375","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4832","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48349","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48477","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2973"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104773","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"http://www.securityfocus.com/bid/104773"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602145","reference_id":"1602145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602145"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_id":"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2973","reference_id":"CVE-2018-2973","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2253","reference_id":"RHSA-2018:2253","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2254","reference_id":"RHSA-2018:2254","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2255","reference_id":"RHSA-2018:2255","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2256","reference_id":"RHSA-2018:2256","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2568","reference_id":"RHSA-2018:2568","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2569","reference_id":"RHSA-2018:2569","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2575","reference_id":"RHSA-2018:2575","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2576","reference_id":"RHSA-2018:2576","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2712","reference_id":"RHSA-2018:2712","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2713","reference_id":"RHSA-2018:2713","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3007","reference_id":"RHSA-2018:3007","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3008","reference_id":"RHSA-2018:3008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3008"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2973"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8gea-2k69-cbdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43642?format=json","vulnerability_id":"VCID-8x6f-shrr-sqaj","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2639","reference_id":"","reference_type":"","scores":[{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68873","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68848","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68883","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68849","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69273","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2639"},{"reference_url":"http://www.securityfocus.com/bid/102556","reference_id":"102556","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"http://www.securityfocus.com/bid/102556"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535351","reference_id":"1535351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535351"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2639"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x6f-shrr-sqaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86310?format=json","vulnerability_id":"VCID-9bfs-vsq6-zbd9","summary":"OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3149.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3149","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20942","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.21","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20794","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20766","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2059","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20615","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2063","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3149"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213365","reference_id":"1213365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-3149"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bfs-vsq6-zbd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34755?format=json","vulnerability_id":"VCID-9gpf-rkqa-2fb4","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4902","reference_id":"","reference_type":"","scores":[{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.9191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95233","published_at":"2026-05-12T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95221","published_at":"2026-05-09T12:55:00Z"},{"value":"0.18088","scoring_system":"epss","scoring_elements":"0.95226","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4902"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77241","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.securityfocus.com/bid/77241"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273860","reference_id":"1273860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273860"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4902","reference_id":"CVE-2015-4902","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4902"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-4902"],"risk_score":9.6,"exploitability":"2.0","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpf-rkqa-2fb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83538?format=json","vulnerability_id":"VCID-9j7e-jeqm-bkat","summary":"JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2783","reference_id":"","reference_type":"","scores":[{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59288","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59304","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59262","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65687","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65559","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2783"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180419-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180419-0001/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.securityfocus.com/bid/103832","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"http://www.securityfocus.com/bid/103832"},{"reference_url":"http://www.securitytracker.com/id/1040697","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"http://www.securitytracker.com/id/1040697"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569204","reference_id":"1569204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569204"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_id":"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2783","reference_id":"CVE-2018-2783","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1203","reference_id":"RHSA-2018:1203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1205","reference_id":"RHSA-2018:1205","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1721","reference_id":"RHSA-2018:1721","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1722","reference_id":"RHSA-2018:1722","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1723","reference_id":"RHSA-2018:1723","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1724","reference_id":"RHSA-2018:1724","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1974","reference_id":"RHSA-2018:1974","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1975","reference_id":"RHSA-2018:1975","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1975"},{"reference_url":"https://usn.ubuntu.com/3644-1/","reference_id":"USN-3644-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/"}],"url":"https://usn.ubuntu.com/3644-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2783"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9j7e-jeqm-bkat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38594?format=json","vulnerability_id":"VCID-9p9b-qh1v-gkcp","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5568","reference_id":"","reference_type":"","scores":[{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76068","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75945","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76015","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76043","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76067","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76054","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75959","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75961","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5568"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386112","reference_id":"1386112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386112"},{"reference_url":"http://www.securityfocus.com/bid/93621","reference_id":"93621","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"http://www.securityfocus.com/bid/93621"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5568"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9p9b-qh1v-gkcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42581?format=json","vulnerability_id":"VCID-9yus-96z5-dub9","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6532","reference_id":"","reference_type":"","scores":[{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.9143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91462","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91495","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6532"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70507","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70507"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152756","reference_id":"1152756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152756"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6532","reference_id":"CVE-2014-6532","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6532"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6532"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yus-96z5-dub9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34352?format=json","vulnerability_id":"VCID-arwd-bvw4-gya1","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21271","reference_id":"","reference_type":"","scores":[{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69192","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.6912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00589","scoring_system":"epss","scoring_elements":"0.69171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83153","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83174","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0007/","reference_id":"ntap-20220121-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0007/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2022-21271"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arwd-bvw4-gya1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34730?format=json","vulnerability_id":"VCID-azcs-6ud7-nfab","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0492","reference_id":"","reference_type":"","scores":[{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83735","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83917","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83933","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83932","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83949","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211770","reference_id":"1211770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211770"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0492"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azcs-6ud7-nfab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34741?format=json","vulnerability_id":"VCID-b4ha-df1e-kkah","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4736","reference_id":"","reference_type":"","scores":[{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90231","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90247","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90276","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90292","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90327","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90338","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90334","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90343","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4736"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243284","reference_id":"1243284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243284"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-4736"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ha-df1e-kkah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50868?format=json","vulnerability_id":"VCID-b9dc-j8uy-nfdz","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which can be remotely exploited without\n    authentication.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10293","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62726","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62527","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.6269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62689","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.6274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62699","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62673","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101338","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"http://www.securityfocus.com/bid/101338"},{"reference_url":"http://www.securitytracker.com/id/1039596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"http://www.securitytracker.com/id/1039596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503320","reference_id":"1503320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503320"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10293","reference_id":"CVE-2017-10293","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10293"},{"reference_url":"https://security.gentoo.org/glsa/201710-31","reference_id":"GLSA-201710-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"https://security.gentoo.org/glsa/201710-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2999","reference_id":"RHSA-2017:2999","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3046","reference_id":"RHSA-2017:3046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3047","reference_id":"RHSA-2017:3047","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3047"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-10293"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9dc-j8uy-nfdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42561?format=json","vulnerability_id":"VCID-bmb1-ekh1-9fc3","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6458","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36182","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36779","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36142","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36244","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36159","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6458"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://secunia.com/advisories/61635","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61635"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70460","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70460"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152763","reference_id":"1152763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152763"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6458","reference_id":"CVE-2014-6458","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6458"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6458"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bmb1-ekh1-9fc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34330?format=json","vulnerability_id":"VCID-bqav-d2f9-x7d1","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2161","reference_id":"","reference_type":"","scores":[{"value":"0.01132","scoring_system":"epss","scoring_elements":"0.78431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01132","scoring_system":"epss","scoring_elements":"0.78484","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01132","scoring_system":"epss","scoring_elements":"0.78468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01132","scoring_system":"epss","scoring_elements":"0.78472","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01132","scoring_system":"epss","scoring_elements":"0.78456","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80414","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80473","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.8048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80481","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.8051","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01404","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2161"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951231","reference_id":"1951231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951231"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/","reference_id":"5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/"},{"reference_url":"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures","reference_id":"april-2021.html#fixed-common-vulnerabilities-and-exposures","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures"},{"reference_url":"https://security.archlinux.org/AVG-1865","reference_id":"AVG-1865","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1865"},{"reference_url":"https://security.archlinux.org/AVG-1866","reference_id":"AVG-1866","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1866"},{"reference_url":"https://security.archlinux.org/AVG-1867","reference_id":"AVG-1867","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1867"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/","reference_id":"CFXOKM2233JVGYDOWW77BN54X3GZTIBK","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/","reference_id":"CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4899","reference_id":"dsa-4899","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://www.debian.org/security/2021/dsa-4899"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/","reference_id":"MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/","reference_id":"MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210513-0001/","reference_id":"ntap-20210513-0001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210513-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1445","reference_id":"RHSA-2021:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1447","reference_id":"RHSA-2021:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1447"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/","reference_id":"UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2021-2161"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43641?format=json","vulnerability_id":"VCID-c1mn-fexd-p3dk","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2638","reference_id":"","reference_type":"","scores":[{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72591","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72615","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73083","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73188","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73041","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2638"},{"reference_url":"http://www.securityfocus.com/bid/102546","reference_id":"102546","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"http://www.securityfocus.com/bid/102546"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535350","reference_id":"1535350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535350"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2638"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1mn-fexd-p3dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30939?format=json","vulnerability_id":"VCID-cmr5-b3n9-6uhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422","reference_id":"","reference_type":"","scores":[{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.8747","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.8799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.88011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03713","scoring_system":"epss","scoring_elements":"0.87984","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3422"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86488","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securityfocus.com/bid/86488"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620","reference_id":"1328620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422","reference_id":"CVE-2016-3422","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34734?format=json","vulnerability_id":"VCID-cwm9-b8a3-skdz","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2637","reference_id":"","reference_type":"","scores":[{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86071","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.8614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.8615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86221","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.8624","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86236","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243287","reference_id":"1243287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243287"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2637"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwm9-b8a3-skdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83282?format=json","vulnerability_id":"VCID-dab9-tg36-93e3","summary":"JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2964","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63255","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63207","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63172","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63228","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63167","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63182","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6319","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104780","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"http://www.securityfocus.com/bid/104780"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602142","reference_id":"1602142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602142"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2964","reference_id":"CVE-2018-2964","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2253","reference_id":"RHSA-2018:2253","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2256","reference_id":"RHSA-2018:2256","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2256"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2964"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dab9-tg36-93e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34738?format=json","vulnerability_id":"VCID-dkzr-ncga-w3ex","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2664","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36527","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36407","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36366","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36394","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3631","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36332","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2664"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243300","reference_id":"1243300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243300"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2664"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkzr-ncga-w3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68625?format=json","vulnerability_id":"VCID-e6dm-6767-9kdk","summary":"openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50059","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32603","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32619","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33891","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33934","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66795","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66775","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376785","reference_id":"2376785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376785"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10867","reference_id":"RHSA-2025:10867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10869","reference_id":"RHSA-2025:10869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10870","reference_id":"RHSA-2025:10870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10873","reference_id":"RHSA-2025:10873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10874","reference_id":"RHSA-2025:10874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10875","reference_id":"RHSA-2025:10875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13656","reference_id":"RHSA-2025:13656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://usn.ubuntu.com/7668-1/","reference_id":"USN-7668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7668-1/"},{"reference_url":"https://usn.ubuntu.com/7669-1/","reference_id":"USN-7669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7669-1/"},{"reference_url":"https://usn.ubuntu.com/7672-1/","reference_id":"USN-7672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7672-1/"},{"reference_url":"https://usn.ubuntu.com/7673-1/","reference_id":"USN-7673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7673-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"},{"reference_url":"https://usn.ubuntu.com/7690-1/","reference_id":"USN-7690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7690-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2025-50059"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31623?format=json","vulnerability_id":"VCID-edzj-4q7d-4bdj","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10105","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55554","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55465","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55569","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55527","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6586","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65937","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65817","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10105"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038931","reference_id":"1038931","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"http://www.securitytracker.com/id/1038931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472667","reference_id":"1472667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472667"},{"reference_url":"http://www.securityfocus.com/bid/99851","reference_id":"99851","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"http://www.securityfocus.com/bid/99851"},{"reference_url":"https://security.gentoo.org/glsa/201709-22","reference_id":"GLSA-201709-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://security.gentoo.org/glsa/201709-22"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170720-0001/","reference_id":"ntap-20170720-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170720-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1790","reference_id":"RHSA-2017:1790","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1791","reference_id":"RHSA-2017:1791","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1792","reference_id":"RHSA-2017:1792","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2469","reference_id":"RHSA-2017:2469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2481","reference_id":"RHSA-2017:2481","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2530","reference_id":"RHSA-2017:2530","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3453","reference_id":"RHSA-2017:3453","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3453"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-10105"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edzj-4q7d-4bdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83724?format=json","vulnerability_id":"VCID-eu23-93rk-pkaz","summary":"JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2657","reference_id":"","reference_type":"","scores":[{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63506","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63461","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63479","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77084","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.7705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77043","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79629","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.79673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01289","scoring_system":"epss","scoring_elements":"0.796","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2657"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102629","reference_id":"102629","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"http://www.securityfocus.com/bid/102629"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535353","reference_id":"1535353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535353"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2657"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu23-93rk-pkaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83281?format=json","vulnerability_id":"VCID-fa7w-w2jp-1kbk","summary":"JDK: unspecified vulnerability fixed in 6u201, 7u191, and 8u181 (Java DB)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2938","reference_id":"","reference_type":"","scores":[{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68834","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.6878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68786","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68765","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68808","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68843","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68809","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68725","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2938"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104774","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"}],"url":"http://www.securityfocus.com/bid/104774"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:46Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602141","reference_id":"1602141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602141"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2938","reference_id":"CVE-2018-2938","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2938"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2938"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fa7w-w2jp-1kbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34735?format=json","vulnerability_id":"VCID-fhch-983g-ryf2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2638","reference_id":"","reference_type":"","scores":[{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.9132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91345","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91355","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91367","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91383","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91394","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91392","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91401","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243283","reference_id":"1243283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243283"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2638"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhch-983g-ryf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81947?format=json","vulnerability_id":"VCID-gmsf-fz6q-xffa","summary":"JDK: unspecified vulnerability fixed in 8u221 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2996","reference_id":"","reference_type":"","scores":[{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84441","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84573","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.8459","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84617","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84633","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.8463","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02225","scoring_system":"epss","scoring_elements":"0.84571","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778942","reference_id":"1778942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778942"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2996","reference_id":"CVE-2019-2996","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"},{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2996"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsf-fz6q-xffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42558?format=json","vulnerability_id":"VCID-gst6-e8vf-jff8","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4288","reference_id":"","reference_type":"","scores":[{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.9143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91462","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06948","scoring_system":"epss","scoring_elements":"0.91495","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4288"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70470","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70470"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152761","reference_id":"1152761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152761"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4288","reference_id":"CVE-2014-4288","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4288"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-4288"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gst6-e8vf-jff8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85602?format=json","vulnerability_id":"VCID-gwf2-u7vy-hqac","summary":"JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Install)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2597","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31085","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3038","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3045","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30458","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30383","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30405","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243285","reference_id":"1243285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243285"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2597"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwf2-u7vy-hqac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34726?format=json","vulnerability_id":"VCID-j4nj-26mu-p7a2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0486","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.57007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56966","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56905","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56907","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56968","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.5692","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0486"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211774","reference_id":"1211774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211774"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0486"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4nj-26mu-p7a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34742?format=json","vulnerability_id":"VCID-j8w9-x9f9-hfec","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4810","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23912","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23871","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23756","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23839","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23908","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2385","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2387","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273858","reference_id":"1273858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273858"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-4810"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8w9-x9f9-hfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43636?format=json","vulnerability_id":"VCID-jnkf-c6qq-77c2","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2627","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64914","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64838","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6488","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64924","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64893","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64818","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2627"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102584","reference_id":"102584","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"}],"url":"http://www.securityfocus.com/bid/102584"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535352","reference_id":"1535352","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535352"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2627"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnkf-c6qq-77c2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42576?format=json","vulnerability_id":"VCID-kbur-d5ax-jqgk","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6515","reference_id":"","reference_type":"","scores":[{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86951","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86782","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.8686","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86876","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86925","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03119","scoring_system":"epss","scoring_elements":"0.86938","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6515"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70565","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152766","reference_id":"1152766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152766"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6515","reference_id":"CVE-2014-6515","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6515"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6515"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbur-d5ax-jqgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50803?format=json","vulnerability_id":"VCID-kbx9-qaje-37bs","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2699","reference_id":"","reference_type":"","scores":[{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78085","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.7789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78076","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77977","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.7797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.7801","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78023","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78032","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.78059","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2699"},{"reference_url":"https://security.gentoo.org/glsa/201908-10","reference_id":"GLSA-201908-10","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/"}],"url":"https://security.gentoo.org/glsa/201908-10"},{"reference_url":"https://support.f5.com/csp/article/K02771314","reference_id":"K02771314","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:43Z/"}],"url":"https://support.f5.com/csp/article/K02771314"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2699"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbx9-qaje-37bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42570?format=json","vulnerability_id":"VCID-kwca-ph6k-wqar","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6503","reference_id":"","reference_type":"","scores":[{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92985","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.9292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92974","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09698","scoring_system":"epss","scoring_elements":"0.92977","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6503"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70518","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152757","reference_id":"1152757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152757"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6503","reference_id":"CVE-2014-6503","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6503"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6503"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwca-ph6k-wqar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=json","vulnerability_id":"VCID-kzak-fju8-eqew","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259","reference_id":"","reference_type":"","scores":[{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64729","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64644","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64736","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64657","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3259"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163","reference_id":"1414163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163"},{"reference_url":"http://www.securityfocus.com/bid/95570","reference_id":"95570","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.securityfocus.com/bid/95570"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0176","reference_id":"RHSA-2017:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0176"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html","reference_id":"RHSA-2017-0176.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0176.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0177","reference_id":"RHSA-2017:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0177"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html","reference_id":"RHSA-2017-0177.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0177.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0263","reference_id":"RHSA-2017:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0263"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html","reference_id":"RHSA-2017-0263.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0263.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html","reference_id":"RHSA-2017-0336.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html","reference_id":"RHSA-2017-0337.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html","reference_id":"RHSA-2017-0338.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-3259"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31637?format=json","vulnerability_id":"VCID-msyp-df3m-gqdx","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10125","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41772","published_at":"2026-05-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41816","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55204","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55191","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10125"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038931","reference_id":"1038931","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"}],"url":"http://www.securitytracker.com/id/1038931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472664","reference_id":"1472664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472664"},{"reference_url":"http://www.securityfocus.com/bid/99809","reference_id":"99809","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"}],"url":"http://www.securityfocus.com/bid/99809"},{"reference_url":"https://security.gentoo.org/glsa/201709-22","reference_id":"GLSA-201709-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"}],"url":"https://security.gentoo.org/glsa/201709-22"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170720-0001/","reference_id":"ntap-20170720-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170720-0001/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-10125"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-msyp-df3m-gqdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50860?format=json","vulnerability_id":"VCID-my4w-m69q-gfak","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0603","reference_id":"","reference_type":"","scores":[{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86667","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.8658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86659","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0603"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Feb/54","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Feb/54"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160217-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20160217-0001/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html"},{"reference_url":"http://www.securityfocus.com/archive/1/537462/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/537462/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/83008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83008"},{"reference_url":"http://www.securitytracker.com/id/1034969","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034969"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0603","reference_id":"CVE-2016-0603","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0603"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-0603"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-my4w-m69q-gfak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48513?format=json","vulnerability_id":"VCID-n3s6-1ba7-47g7","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5556","reference_id":"","reference_type":"","scores":[{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87147","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87104","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.8712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87137","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03217","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.8975","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5556"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386408","reference_id":"1386408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386408"},{"reference_url":"http://www.securityfocus.com/bid/93618","reference_id":"93618","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://www.securityfocus.com/bid/93618"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5556"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n3s6-1ba7-47g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50863?format=json","vulnerability_id":"VCID-n6gk-phrw-cbbw","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3503","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25081","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25189","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25135","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25063","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25262","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91996","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securityfocus.com/bid/91996"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358169","reference_id":"1358169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358169"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3503","reference_id":"CVE-2016-3503","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3503"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1477","reference_id":"RHSA-2016:1477","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1477"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3503"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gk-phrw-cbbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43659?format=json","vulnerability_id":"VCID-nnks-uqvq-dubg","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2426","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67225","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67145","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6719","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67229","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6715","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2426"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190118-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190118-0001/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"http://www.securityfocus.com/bid/106590","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"http://www.securityfocus.com/bid/106590"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665953","reference_id":"1665953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665953"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_id":"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2426","reference_id":"CVE-2019-2426","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2426"},{"reference_url":"https://security.gentoo.org/glsa/201903-14","reference_id":"GLSA-201903-14","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:59Z/"}],"url":"https://security.gentoo.org/glsa/201903-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2426"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nnks-uqvq-dubg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71990?format=json","vulnerability_id":"VCID-ntga-y6cv-a3df","summary":"openjdk: Enhance array handling (Oracle CPU 2025-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21502","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42064","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4174","published_at":"2026-05-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41803","published_at":"2026-05-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41715","published_at":"2026-05-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41858","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41718","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338992","reference_id":"2338992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338992"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0421","reference_id":"RHSA-2025:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0422","reference_id":"RHSA-2025:0422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0423","reference_id":"RHSA-2025:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0424","reference_id":"RHSA-2025:0424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0425","reference_id":"RHSA-2025:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0426","reference_id":"RHSA-2025:0426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0427","reference_id":"RHSA-2025:0427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0428","reference_id":"RHSA-2025:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0429","reference_id":"RHSA-2025:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1154","reference_id":"RHSA-2025:1154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2615","reference_id":"RHSA-2025:2615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2615"},{"reference_url":"https://usn.ubuntu.com/7252-1/","reference_id":"USN-7252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7252-1/"},{"reference_url":"https://usn.ubuntu.com/7253-1/","reference_id":"USN-7253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7253-1/"},{"reference_url":"https://usn.ubuntu.com/7254-1/","reference_id":"USN-7254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7254-1/"},{"reference_url":"https://usn.ubuntu.com/7255-1/","reference_id":"USN-7255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7255-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2025-21502"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40146?format=json","vulnerability_id":"VCID-ntmk-ub1c-5ygz","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0403","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30533","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30511","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30579","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30587","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31232","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32333","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32309","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3236","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0403"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184275","reference_id":"1184275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184275"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0403"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ntmk-ub1c-5ygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50865?format=json","vulnerability_id":"VCID-pynq-sbec-akf8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3552","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17814","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17825","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17714","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17777","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1787","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/92000","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securityfocus.com/bid/92000"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358167","reference_id":"1358167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358167"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3552","reference_id":"CVE-2016-3552","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3552"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3552"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pynq-sbec-akf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81945?format=json","vulnerability_id":"VCID-qc7k-5py9-y7ab","summary":"OpenJDK: Incorrect escaping of command line arguments in ProcessImpl on Windows (Libraries, 8221858)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2958.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2958","reference_id":"","reference_type":"","scores":[{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78895","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78765","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.7877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01183","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2958"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:26Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777929","reference_id":"1777929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777929"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2958","reference_id":"CVE-2019-2958","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2958"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2958"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qc7k-5py9-y7ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=json","vulnerability_id":"VCID-qp1y-5scd-c7hy","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1589.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23137","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160721-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160721-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91990","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securityfocus.com/bid/91990"},{"reference_url":"http://www.securitytracker.com/id/1036365","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"http://www.securitytracker.com/id/1036365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168","reference_id":"1358168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511","reference_id":"CVE-2016-3511","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511"},{"reference_url":"https://security.gentoo.org/glsa/201610-08","reference_id":"GLSA-201610-08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://security.gentoo.org/glsa/201610-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1475","reference_id":"RHSA-2016:1475","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1476","reference_id":"RHSA-2016:1476","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1587","reference_id":"RHSA-2016:1587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1588","reference_id":"RHSA-2016:1588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1589","reference_id":"RHSA-2016:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3511"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42565?format=json","vulnerability_id":"VCID-qr8w-umju-9yfd","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6476","reference_id":"","reference_type":"","scores":[{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89314","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89186","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.8924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89259","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89268","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89294","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89306","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04591","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6476"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70531","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70531"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152765","reference_id":"1152765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152765"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6476","reference_id":"CVE-2014-6476","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6476"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6476"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8w-umju-9yfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30943?format=json","vulnerability_id":"VCID-qs56-bnkb-buhu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449","reference_id":"","reference_type":"","scores":[{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88377","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.8839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88603","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.88552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0409","scoring_system":"epss","scoring_elements":"0.8857","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160420-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86485","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securityfocus.com/bid/86485"},{"reference_url":"http://www.securitytracker.com/id/1035596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"http://www.securitytracker.com/id/1035596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619","reference_id":"1328619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449","reference_id":"CVE-2016-3449","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449"},{"reference_url":"https://security.gentoo.org/glsa/201606-18","reference_id":"GLSA-201606-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://security.gentoo.org/glsa/201606-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0677","reference_id":"RHSA-2016:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0678","reference_id":"RHSA-2016:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0679","reference_id":"RHSA-2016:0679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-3449"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83284?format=json","vulnerability_id":"VCID-qtnv-wwec-gufw","summary":"JDK: unspecified vulnerability fixed in 7u191 and 8u181 (Windows DLL)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2942","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69756","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6971","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69729","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6976","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6973","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69644","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104781","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"}],"url":"http://www.securityfocus.com/bid/104781"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:42Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602144","reference_id":"1602144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602144"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2942","reference_id":"CVE-2018-2942","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2942"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-2942"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtnv-wwec-gufw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60253?format=json","vulnerability_id":"VCID-rudc-b743-5uh8","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3514.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3514","reference_id":"","reference_type":"","scores":[{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.79045","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.79031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.79029","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78863","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78928","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3514"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97729","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"}],"url":"http://www.securityfocus.com/bid/97729"},{"reference_url":"http://www.securitytracker.com/id/1038286","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"}],"url":"http://www.securitytracker.com/id/1038286"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443469","reference_id":"1443469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443469"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3514","reference_id":"CVE-2017-3514","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3514"},{"reference_url":"https://security.gentoo.org/glsa/201705-03","reference_id":"GLSA-201705-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"}],"url":"https://security.gentoo.org/glsa/201705-03"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:48Z/"}],"url":"https://security.gentoo.org/glsa/201707-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-3514"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rudc-b743-5uh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34729?format=json","vulnerability_id":"VCID-rzqe-8qgr-7fet","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0491","reference_id":"","reference_type":"","scores":[{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92005","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92013","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92024","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92037","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92046","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92047","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92053","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211769","reference_id":"1211769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211769"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0491"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqe-8qgr-7fet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34715?format=json","vulnerability_id":"VCID-ubqp-f2qp-5qcn","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0458","reference_id":"","reference_type":"","scores":[{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91801","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91821","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.9182","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0458"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211771","reference_id":"1211771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211771"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0458"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubqp-f2qp-5qcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42579?format=json","vulnerability_id":"VCID-ue2f-emuu-43af","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6527","reference_id":"","reference_type":"","scores":[{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85896","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.8576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85797","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85829","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85868","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85885","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85883","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6527"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61346","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61346"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70560"},{"reference_url":"http://www.ubuntu.com/usn/USN-2388-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2388-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2388-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2388-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152767","reference_id":"1152767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152767"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6527","reference_id":"CVE-2014-6527","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6527"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://usn.ubuntu.com/2388-1/","reference_id":"USN-2388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2388-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6527"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ue2f-emuu-43af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42567?format=json","vulnerability_id":"VCID-uhsa-uttv-mfes","summary":"Multiple vulnerabilities have been found in Oracle's Java SE\n    Development Kit and Runtime Environment, the worst of which could lead to\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6492","reference_id":"","reference_type":"","scores":[{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82562","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82336","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82409","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.8245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82485","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82526","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6492"},{"reference_url":"http://secunia.com/advisories/61163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61163"},{"reference_url":"http://secunia.com/advisories/61164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61164"},{"reference_url":"http://secunia.com/advisories/61609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61609"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"reference_url":"http://www.securityfocus.com/bid/70456","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70456"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152759","reference_id":"1152759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152759"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6492","reference_id":"CVE-2014-6492","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6492"},{"reference_url":"https://security.gentoo.org/glsa/201502-12","reference_id":"GLSA-201502-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1657","reference_id":"RHSA-2014:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1658","reference_id":"RHSA-2014:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6492"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhsa-uttv-mfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/27185?format=json","vulnerability_id":"VCID-umzv-dbgt-c7hu","summary":"Sparkle Signing Checks Bypass\nA security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0509","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21601","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2179","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21569","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21539","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21625","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0509"},{"reference_url":"https://github.com/sparkle-project/Sparkle","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/sparkle-project/Sparkle"},{"reference_url":"https://github.com/sparkle-project/Sparkle/pull/2550","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/"}],"url":"https://github.com/sparkle-project/Sparkle/pull/2550"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0509","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0509"},{"reference_url":"https://security.netapp.com/advisory/ntap-20250124-0008","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20250124-0008"},{"reference_url":"https://sparkle-project.org/documentation/security-and-reliability","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://sparkle-project.org/documentation/security-and-reliability"},{"reference_url":"https://sparkle-project.org/documentation/security-and-reliability/","reference_id":"security-and-reliability","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-04T20:29:02Z/"}],"url":"https://sparkle-project.org/documentation/security-and-reliability/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2025-0509","GHSA-wc9m-r3v6-9p5h"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umzv-dbgt-c7hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37013?format=json","vulnerability_id":"VCID-upgw-aw1e-m7g6","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8328","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68162","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68281","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68327","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68364","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68329","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68296","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414164","reference_id":"1414164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414164"},{"reference_url":"http://www.securityfocus.com/bid/95581","reference_id":"95581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"http://www.securityfocus.com/bid/95581"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-8328"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upgw-aw1e-m7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34716?format=json","vulnerability_id":"VCID-w2ja-cauk-8ke2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0459","reference_id":"","reference_type":"","scores":[{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.9305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93058","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93063","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.9309","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93098","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93112","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93123","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93125","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93133","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0459"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211768","reference_id":"1211768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211768"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0459"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ja-cauk-8ke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/353825?format=json","vulnerability_id":"VCID-xbzv-pbs3-jubk","summary":"Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u481 and  8u481-b50; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-22003","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01847","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01923","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01926","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01983","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-22003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894","reference_id":"1134894","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2026.html","reference_id":"cpuapr2026.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:09:59Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2026-22003"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbzv-pbs3-jubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40147?format=json","vulnerability_id":"VCID-xry5-hzk4-b3b8","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0406","reference_id":"","reference_type":"","scores":[{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90506","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.9055","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90559","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05843","scoring_system":"epss","scoring_elements":"0.90574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.9164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.91652","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.91665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.91676","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.91674","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07234","scoring_system":"epss","scoring_elements":"0.91684","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0406"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184277","reference_id":"1184277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184277"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0406"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xry5-hzk4-b3b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37029?format=json","vulnerability_id":"VCID-xwtx-qzfe-duac","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3262","reference_id":"","reference_type":"","scores":[{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71117","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71282","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71317","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71279","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7125","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3262"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037637","reference_id":"1037637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"http://www.securitytracker.com/id/1037637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414162","reference_id":"1414162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414162"},{"reference_url":"http://www.securityfocus.com/bid/95578","reference_id":"95578","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"http://www.securityfocus.com/bid/95578"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.netapp.com/advisory/ntap-20170119-0001/","reference_id":"ntap-20170119-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0175","reference_id":"RHSA-2017:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0175"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html","reference_id":"RHSA-2017-0175.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0175.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2017-3262"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtx-qzfe-duac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82364?format=json","vulnerability_id":"VCID-xx59-6jd1-wbdr","summary":"OpenJDK: Insufficient permission checks for file:// URLs on Windows (Networking, 8213431)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2766","reference_id":"","reference_type":"","scores":[{"value":"0.00994","scoring_system":"epss","scoring_elements":"0.77063","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00994","scoring_system":"epss","scoring_elements":"0.77059","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00994","scoring_system":"epss","scoring_elements":"0.77046","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77263","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81991","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.82018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.82006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01649","scoring_system":"epss","scoring_elements":"0.81934","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2766"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730459","reference_id":"1730459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730459"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300","reference_id":"index?page=content&id=SB10300","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:00Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2019-2766"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xx59-6jd1-wbdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34740?format=json","vulnerability_id":"VCID-y1a8-8hmg-w3e3","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4729","reference_id":"","reference_type":"","scores":[{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85532","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85627","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.8565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85702","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85719","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85714","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85727","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243290","reference_id":"1243290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243290"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-4729"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y1a8-8hmg-w3e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34732?format=json","vulnerability_id":"VCID-yw9c-x1mv-3beb","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2619","reference_id":"","reference_type":"","scores":[{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84565","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84613","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84639","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84678","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84695","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243286","reference_id":"1243286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243286"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-2619"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yw9c-x1mv-3beb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50797?format=json","vulnerability_id":"VCID-z5kk-krqv-37aa","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3211","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40081","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40137","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40153","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40057","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40494","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40299","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/105591","reference_id":"105591","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"}],"url":"http://www.securityfocus.com/bid/105591"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639906","reference_id":"1639906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639906"},{"reference_url":"https://security.gentoo.org/glsa/201908-10","reference_id":"GLSA-201908-10","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"}],"url":"https://security.gentoo.org/glsa/201908-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3002","reference_id":"RHSA-2018:3002","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3003","reference_id":"RHSA-2018:3003","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2018-3211"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z5kk-krqv-37aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31276?format=json","vulnerability_id":"VCID-ztyf-ukmt-63b3","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0400","reference_id":"","reference_type":"","scores":[{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81234","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81266","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81297","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81336","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81388","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81408","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.8143","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81426","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01528","scoring_system":"epss","scoring_elements":"0.81444","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0400"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183039","reference_id":"1183039","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183039"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0400"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyf-ukmt-63b3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"}