Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/50869?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50869?format=api", "vulnerability_id": "VCID-45wy-ban5-qqg8", "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n software suites, the worst of which can be remotely exploited without\n authentication.", "aliases": [ { "alias": "CVE-2017-10309" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api", "purl": "pkg:deb/debian/openjdk-8@0?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108341?format=api", "purl": "pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/78999?format=api", "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.152-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.152-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/79000?format=api", "purl": "pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.152-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.152-r1" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/110816?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.1?arch=el6_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2r75-1ccm-d7aw" }, { "vulnerability": "VCID-3xyb-xeyq-n3dm" }, { "vulnerability": "VCID-43vy-2etx-9ucx" }, { "vulnerability": "VCID-45wy-ban5-qqg8" }, { "vulnerability": "VCID-49z5-4djw-xuav" }, { "vulnerability": "VCID-4ucs-3zp9-rqey" }, { "vulnerability": "VCID-5jvq-evzj-tfcc" }, { "vulnerability": "VCID-5vrc-h4t3-uucb" }, { "vulnerability": "VCID-69zc-r9uw-jke5" }, { "vulnerability": "VCID-7d2e-14yp-pkhq" }, { "vulnerability": "VCID-8vr7-v6d5-gfhw" }, { "vulnerability": "VCID-8y3w-1sev-27d4" }, { "vulnerability": "VCID-9bbp-mutu-bqbf" }, { "vulnerability": "VCID-9yds-dpzg-4ba9" }, { "vulnerability": "VCID-a6rq-d1rv-j7dn" }, { "vulnerability": "VCID-awrz-da8u-7ud2" }, { "vulnerability": "VCID-bg39-wvte-83c1" }, { "vulnerability": "VCID-bthw-frhn-wqf6" }, { "vulnerability": "VCID-c9qw-1g2p-qqcr" }, { "vulnerability": "VCID-d4gw-vgm6-qbf3" }, { "vulnerability": "VCID-dtcg-vqnh-kugk" }, { "vulnerability": "VCID-edzj-4q7d-4bdj" }, { "vulnerability": "VCID-eyjp-7kks-jbfr" }, { "vulnerability": "VCID-fsu1-jy1q-qkh1" }, { "vulnerability": "VCID-ft81-49v3-a7cr" }, { "vulnerability": "VCID-hxb8-qu7h-8bdu" }, { "vulnerability": "VCID-kejc-5261-t7c6" }, { "vulnerability": "VCID-m6xx-a91r-sbhu" }, { "vulnerability": "VCID-m84d-m2tw-tyet" }, { "vulnerability": "VCID-mr6h-6jrp-gyf3" }, { "vulnerability": "VCID-n46g-eb9y-9bds" }, { "vulnerability": "VCID-ps35-n8f5-uqcr" }, { "vulnerability": "VCID-qfam-11ye-tkd8" }, { "vulnerability": "VCID-rvvx-ed8u-auc5" }, { "vulnerability": "VCID-smft-ms93-6kf1" }, { "vulnerability": "VCID-su3k-9x5e-rqg4" }, { "vulnerability": "VCID-u1c5-pgk4-8bcj" }, { "vulnerability": "VCID-wcc9-n2hm-87fx" }, { "vulnerability": "VCID-wjun-m9my-5qbb" }, { "vulnerability": "VCID-xayg-2xtc-r7ej" }, { "vulnerability": "VCID-xx3g-udjr-7yep" }, { "vulnerability": "VCID-zzqd-253d-ykca" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.1%3Farch=el6_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/110815?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2r75-1ccm-d7aw" }, { "vulnerability": "VCID-45wy-ban5-qqg8" }, { "vulnerability": "VCID-8vr7-v6d5-gfhw" }, { "vulnerability": "VCID-8y3w-1sev-27d4" }, { "vulnerability": "VCID-9bbp-mutu-bqbf" }, { "vulnerability": "VCID-a6rq-d1rv-j7dn" }, { "vulnerability": "VCID-bg39-wvte-83c1" }, { "vulnerability": "VCID-kejc-5261-t7c6" }, { "vulnerability": "VCID-m84d-m2tw-tyet" }, { "vulnerability": "VCID-n46g-eb9y-9bds" }, { "vulnerability": "VCID-rvvx-ed8u-auc5" }, { "vulnerability": "VCID-u1c5-pgk4-8bcj" }, { "vulnerability": "VCID-wjun-m9my-5qbb" }, { "vulnerability": "VCID-xayg-2xtc-r7ej" }, { "vulnerability": "VCID-xx3g-udjr-7yep" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.2%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/110805?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.1?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2r75-1ccm-d7aw" }, { "vulnerability": "VCID-45wy-ban5-qqg8" }, { "vulnerability": "VCID-8vr7-v6d5-gfhw" }, { "vulnerability": "VCID-8y3w-1sev-27d4" }, { "vulnerability": "VCID-9bbp-mutu-bqbf" }, { "vulnerability": "VCID-a6rq-d1rv-j7dn" }, { "vulnerability": "VCID-b9dc-j8uy-nfdz" }, { "vulnerability": "VCID-bg39-wvte-83c1" }, { "vulnerability": "VCID-eyjp-7kks-jbfr" }, { "vulnerability": "VCID-kejc-5261-t7c6" }, { "vulnerability": "VCID-m6xx-a91r-sbhu" }, { "vulnerability": "VCID-m84d-m2tw-tyet" }, { "vulnerability": "VCID-mr6h-6jrp-gyf3" }, { "vulnerability": "VCID-n46g-eb9y-9bds" }, { "vulnerability": "VCID-pdv6-xmdk-d3hy" }, { "vulnerability": "VCID-rvvx-ed8u-auc5" }, { "vulnerability": "VCID-smft-ms93-6kf1" }, { "vulnerability": "VCID-u1c5-pgk4-8bcj" }, { "vulnerability": "VCID-wjun-m9my-5qbb" }, { "vulnerability": "VCID-xayg-2xtc-r7ej" }, { "vulnerability": "VCID-xx3g-udjr-7yep" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.1%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/110811?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.5?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2r75-1ccm-d7aw" }, { "vulnerability": "VCID-45wy-ban5-qqg8" }, { "vulnerability": "VCID-8vr7-v6d5-gfhw" }, { "vulnerability": "VCID-8y3w-1sev-27d4" }, { "vulnerability": "VCID-9bbp-mutu-bqbf" }, { "vulnerability": "VCID-a6rq-d1rv-j7dn" }, { "vulnerability": "VCID-b9dc-j8uy-nfdz" }, { "vulnerability": "VCID-bg39-wvte-83c1" }, { "vulnerability": "VCID-eyjp-7kks-jbfr" }, { "vulnerability": "VCID-kejc-5261-t7c6" }, { "vulnerability": "VCID-m6xx-a91r-sbhu" }, { "vulnerability": "VCID-m84d-m2tw-tyet" }, { "vulnerability": "VCID-mr6h-6jrp-gyf3" }, { "vulnerability": "VCID-n46g-eb9y-9bds" }, { "vulnerability": "VCID-pdv6-xmdk-d3hy" }, { "vulnerability": "VCID-rvvx-ed8u-auc5" }, { "vulnerability": "VCID-smft-ms93-6kf1" }, { "vulnerability": "VCID-u1c5-pgk4-8bcj" }, { "vulnerability": "VCID-wjun-m9my-5qbb" }, { "vulnerability": "VCID-xayg-2xtc-r7ej" }, { "vulnerability": "VCID-xx3g-udjr-7yep" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.5%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82769", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82758", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82846", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.8288", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82884", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82924", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82945", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82943", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82958", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82801", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82817", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01803", "scoring_system": "epss", "scoring_elements": "0.82808", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01939", "scoring_system": "epss", "scoring_elements": "0.83608", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10309" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20171019-0001/" }, { "reference_url": "https://www.exploit-db.com/exploits/43103/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://www.exploit-db.com/exploits/43103/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/101328", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "http://www.securityfocus.com/bid/101328" }, { "reference_url": "http://www.securitytracker.com/id/1039596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "http://www.securitytracker.com/id/1039596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503319", "reference_id": "1503319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503319" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py", "reference_id": "CVE-2017-10309", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10309", "reference_id": "CVE-2017-10309", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10309" }, { "reference_url": "http://srcincite.io/advisories/src-2017-0028/", "reference_id": "CVE-2017-10309", "reference_type": "exploit", "scores": [], "url": "http://srcincite.io/advisories/src-2017-0028/" }, { "reference_url": "https://security.gentoo.org/glsa/201710-31", "reference_id": "GLSA-201710-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://security.gentoo.org/glsa/201710-31" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999", "reference_id": "RHSA-2017:2999", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264", "reference_id": "RHSA-2017:3264", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267", "reference_id": "RHSA-2017:3267", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" } ], "weaknesses": [], "exploits": [ { "date_added": "2017-10-30", "description": "Oracle Java SE - Web Start jnlp XML External Entity Processing Information Disclosure", "required_action": null, "due_date": null, "notes": null, "known_ransomware_campaign_use": true, "source_date_published": "2017-10-30", "exploit_type": "webapps", "platform": "xml", "source_date_updated": "2017-10-30", "data_source": "Exploit-DB", "source_url": "http://srcincite.io/advisories/src-2017-0028/" } ], "severity_range_score": "6.4 - 7.1", "exploitability": "2.0", "weighted_severity": "6.4", "risk_score": 10.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45wy-ban5-qqg8" }