{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","type":"deb","namespace":"debian","name":"openjdk-8","version":"8u111-b14-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8u121-b13-1","latest_non_vulnerable_version":"8u482-ga-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38597?format=json","vulnerability_id":"VCID-1pew-7np4-vqfu","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597","reference_id":"","reference_type":"","scores":[{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.8337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01929","scoring_system":"epss","scoring_elements":"0.83331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84264","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02132","scoring_system":"epss","scoring_elements":"0.84245","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103","reference_id":"1386103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103"},{"reference_url":"http://www.securityfocus.com/bid/93636","reference_id":"93636","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.securityfocus.com/bid/93636"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5597"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38592?format=json","vulnerability_id":"VCID-b15r-cqd5-rugd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714","reference_id":"1385714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714"},{"reference_url":"http://www.securityfocus.com/bid/93637","reference_id":"93637","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.securityfocus.com/bid/93637"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5554"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38595?format=json","vulnerability_id":"VCID-n1wv-bkbb-gugt","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573","reference_id":"","reference_type":"","scores":[{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0284","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06951","scoring_system":"epss","scoring_elements":"0.91461","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544","reference_id":"1385544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544"},{"reference_url":"http://www.securityfocus.com/bid/93628","reference_id":"93628","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.securityfocus.com/bid/93628"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5573"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38596?format=json","vulnerability_id":"VCID-rxem-v2fe-jfde","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5582","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88825","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05209","scoring_system":"epss","scoring_elements":"0.89978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05209","scoring_system":"epss","scoring_elements":"0.89964","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385402","reference_id":"1385402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385402"},{"reference_url":"http://www.securityfocus.com/bid/93623","reference_id":"93623","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.securityfocus.com/bid/93623"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5582"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxem-v2fe-jfde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38589?format=json","vulnerability_id":"VCID-u3rj-qyrr-vkbw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542","reference_id":"","reference_type":"","scores":[{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02018","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037040","reference_id":"1037040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securitytracker.com/id/1037040"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723","reference_id":"1385723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723"},{"reference_url":"http://www.securityfocus.com/bid/93643","reference_id":"93643","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.securityfocus.com/bid/93643"},{"reference_url":"http://www.debian.org/security/2016/dsa-3707","reference_id":"dsa-3707","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.debian.org/security/2016/dsa-3707"},{"reference_url":"https://security.gentoo.org/glsa/201611-04","reference_id":"GLSA-201611-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201611-04"},{"reference_url":"https://security.gentoo.org/glsa/201701-43","reference_id":"GLSA-201701-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-43"},{"reference_url":"https://security.netapp.com/advisory/ntap-20161019-0001/","reference_id":"ntap-20161019-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20161019-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2079","reference_id":"RHSA-2016:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2079"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html","reference_id":"RHSA-2016-2079.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2079.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2088","reference_id":"RHSA-2016:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2088"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html","reference_id":"RHSA-2016-2088.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2088.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2089","reference_id":"RHSA-2016:2089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2089"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html","reference_id":"RHSA-2016-2089.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2089.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2090","reference_id":"RHSA-2016:2090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2090"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html","reference_id":"RHSA-2016-2090.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2090.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2136","reference_id":"RHSA-2016:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2136"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html","reference_id":"RHSA-2016-2136.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2136.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2137","reference_id":"RHSA-2016:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2137"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html","reference_id":"RHSA-2016-2137.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2137.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2138","reference_id":"RHSA-2016:2138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2138"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html","reference_id":"RHSA-2016-2138.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2138.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2658","reference_id":"RHSA-2016:2658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2658"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html","reference_id":"RHSA-2016-2658.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2658.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2659","reference_id":"RHSA-2016:2659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2659"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html","reference_id":"RHSA-2016-2659.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2659.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0061","reference_id":"RHSA-2017:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0061"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html","reference_id":"RHSA-2017-0061.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0061.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://usn.ubuntu.com/3121-1/","reference_id":"USN-3121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3121-1/"},{"reference_url":"https://usn.ubuntu.com/3130-1/","reference_id":"USN-3130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3130-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3130-1","reference_id":"USN-3130-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3130-1"},{"reference_url":"https://usn.ubuntu.com/3154-1/","reference_id":"USN-3154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3154-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3154-1","reference_id":"USN-3154-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"}],"url":"http://www.ubuntu.com/usn/USN-3154-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933684?format=json","purl":"pkg:deb/debian/openjdk-8@8u111-b14-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"}],"aliases":["CVE-2016-5542"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u111-b14-1%3Fdistro=sid"}