{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50869?format=json","vulnerability_id":"VCID-45wy-ban5-qqg8","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which can be remotely exploited without\n    authentication.","aliases":[{"alias":"CVE-2017-10309"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933673?format=json","purl":"pkg:deb/debian/openjdk-8@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/78999?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.152-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.152-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/79000?format=json","purl":"pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.152-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.152-r1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/110816?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.1?arch=el6_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2r75-1ccm-d7aw"},{"vulnerability":"VCID-3xyb-xeyq-n3dm"},{"vulnerability":"VCID-43vy-2etx-9ucx"},{"vulnerability":"VCID-45wy-ban5-qqg8"},{"vulnerability":"VCID-49z5-4djw-xuav"},{"vulnerability":"VCID-4ucs-3zp9-rqey"},{"vulnerability":"VCID-5jvq-evzj-tfcc"},{"vulnerability":"VCID-5vrc-h4t3-uucb"},{"vulnerability":"VCID-69zc-r9uw-jke5"},{"vulnerability":"VCID-7d2e-14yp-pkhq"},{"vulnerability":"VCID-8vr7-v6d5-gfhw"},{"vulnerability":"VCID-8y3w-1sev-27d4"},{"vulnerability":"VCID-9bbp-mutu-bqbf"},{"vulnerability":"VCID-9yds-dpzg-4ba9"},{"vulnerability":"VCID-a6rq-d1rv-j7dn"},{"vulnerability":"VCID-awrz-da8u-7ud2"},{"vulnerability":"VCID-bg39-wvte-83c1"},{"vulnerability":"VCID-bthw-frhn-wqf6"},{"vulnerability":"VCID-c9qw-1g2p-qqcr"},{"vulnerability":"VCID-d4gw-vgm6-qbf3"},{"vulnerability":"VCID-dtcg-vqnh-kugk"},{"vulnerability":"VCID-edzj-4q7d-4bdj"},{"vulnerability":"VCID-eyjp-7kks-jbfr"},{"vulnerability":"VCID-fsu1-jy1q-qkh1"},{"vulnerability":"VCID-ft81-49v3-a7cr"},{"vulnerability":"VCID-hxb8-qu7h-8bdu"},{"vulnerability":"VCID-kejc-5261-t7c6"},{"vulnerability":"VCID-m6xx-a91r-sbhu"},{"vulnerability":"VCID-m84d-m2tw-tyet"},{"vulnerability":"VCID-mr6h-6jrp-gyf3"},{"vulnerability":"VCID-n46g-eb9y-9bds"},{"vulnerability":"VCID-ps35-n8f5-uqcr"},{"vulnerability":"VCID-qfam-11ye-tkd8"},{"vulnerability":"VCID-rvvx-ed8u-auc5"},{"vulnerability":"VCID-smft-ms93-6kf1"},{"vulnerability":"VCID-su3k-9x5e-rqg4"},{"vulnerability":"VCID-u1c5-pgk4-8bcj"},{"vulnerability":"VCID-wcc9-n2hm-87fx"},{"vulnerability":"VCID-wjun-m9my-5qbb"},{"vulnerability":"VCID-xayg-2xtc-r7ej"},{"vulnerability":"VCID-xx3g-udjr-7yep"},{"vulnerability":"VCID-zzqd-253d-ykca"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.1%3Farch=el6_9"},{"url":"http://public2.vulnerablecode.io/api/packages/110815?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.2?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2r75-1ccm-d7aw"},{"vulnerability":"VCID-45wy-ban5-qqg8"},{"vulnerability":"VCID-8vr7-v6d5-gfhw"},{"vulnerability":"VCID-8y3w-1sev-27d4"},{"vulnerability":"VCID-9bbp-mutu-bqbf"},{"vulnerability":"VCID-a6rq-d1rv-j7dn"},{"vulnerability":"VCID-bg39-wvte-83c1"},{"vulnerability":"VCID-kejc-5261-t7c6"},{"vulnerability":"VCID-m84d-m2tw-tyet"},{"vulnerability":"VCID-n46g-eb9y-9bds"},{"vulnerability":"VCID-rvvx-ed8u-auc5"},{"vulnerability":"VCID-u1c5-pgk4-8bcj"},{"vulnerability":"VCID-wjun-m9my-5qbb"},{"vulnerability":"VCID-xayg-2xtc-r7ej"},{"vulnerability":"VCID-xx3g-udjr-7yep"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.5-1jpp.2%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/110805?format=json","purl":"pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2r75-1ccm-d7aw"},{"vulnerability":"VCID-45wy-ban5-qqg8"},{"vulnerability":"VCID-8vr7-v6d5-gfhw"},{"vulnerability":"VCID-8y3w-1sev-27d4"},{"vulnerability":"VCID-9bbp-mutu-bqbf"},{"vulnerability":"VCID-a6rq-d1rv-j7dn"},{"vulnerability":"VCID-b9dc-j8uy-nfdz"},{"vulnerability":"VCID-bg39-wvte-83c1"},{"vulnerability":"VCID-eyjp-7kks-jbfr"},{"vulnerability":"VCID-kejc-5261-t7c6"},{"vulnerability":"VCID-m6xx-a91r-sbhu"},{"vulnerability":"VCID-m84d-m2tw-tyet"},{"vulnerability":"VCID-mr6h-6jrp-gyf3"},{"vulnerability":"VCID-n46g-eb9y-9bds"},{"vulnerability":"VCID-pdv6-xmdk-d3hy"},{"vulnerability":"VCID-rvvx-ed8u-auc5"},{"vulnerability":"VCID-smft-ms93-6kf1"},{"vulnerability":"VCID-u1c5-pgk4-8bcj"},{"vulnerability":"VCID-wjun-m9my-5qbb"},{"vulnerability":"VCID-xayg-2xtc-r7ej"},{"vulnerability":"VCID-xx3g-udjr-7yep"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/110811?format=json","purl":"pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.5?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2r75-1ccm-d7aw"},{"vulnerability":"VCID-45wy-ban5-qqg8"},{"vulnerability":"VCID-8vr7-v6d5-gfhw"},{"vulnerability":"VCID-8y3w-1sev-27d4"},{"vulnerability":"VCID-9bbp-mutu-bqbf"},{"vulnerability":"VCID-a6rq-d1rv-j7dn"},{"vulnerability":"VCID-b9dc-j8uy-nfdz"},{"vulnerability":"VCID-bg39-wvte-83c1"},{"vulnerability":"VCID-eyjp-7kks-jbfr"},{"vulnerability":"VCID-kejc-5261-t7c6"},{"vulnerability":"VCID-m6xx-a91r-sbhu"},{"vulnerability":"VCID-m84d-m2tw-tyet"},{"vulnerability":"VCID-mr6h-6jrp-gyf3"},{"vulnerability":"VCID-n46g-eb9y-9bds"},{"vulnerability":"VCID-pdv6-xmdk-d3hy"},{"vulnerability":"VCID-rvvx-ed8u-auc5"},{"vulnerability":"VCID-smft-ms93-6kf1"},{"vulnerability":"VCID-u1c5-pgk4-8bcj"},{"vulnerability":"VCID-wjun-m9my-5qbb"},{"vulnerability":"VCID-xayg-2xtc-r7ej"},{"vulnerability":"VCID-xx3g-udjr-7yep"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.151-1jpp.5%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10309","reference_id":"","reference_type":"","scores":[{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.8288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82945","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82943","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82958","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01803","scoring_system":"epss","scoring_elements":"0.82808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01939","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10309"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0001/"},{"reference_url":"https://www.exploit-db.com/exploits/43103/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://www.exploit-db.com/exploits/43103/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101328","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.securityfocus.com/bid/101328"},{"reference_url":"http://www.securitytracker.com/id/1039596","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"http://www.securitytracker.com/id/1039596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503319","reference_id":"1503319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503319"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py","reference_id":"CVE-2017-10309","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/xml/webapps/43103.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10309","reference_id":"CVE-2017-10309","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10309"},{"reference_url":"http://srcincite.io/advisories/src-2017-0028/","reference_id":"CVE-2017-10309","reference_type":"exploit","scores":[],"url":"http://srcincite.io/advisories/src-2017-0028/"},{"reference_url":"https://security.gentoo.org/glsa/201710-31","reference_id":"GLSA-201710-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://security.gentoo.org/glsa/201710-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2999","reference_id":"RHSA-2017:2999","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3264","reference_id":"RHSA-2017:3264","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3267","reference_id":"RHSA-2017:3267","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3453","reference_id":"RHSA-2017:3453","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3453"}],"weaknesses":[],"exploits":[{"date_added":"2017-10-30","description":"Oracle Java SE - Web Start jnlp XML External Entity Processing Information Disclosure","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2017-10-30","exploit_type":"webapps","platform":"xml","source_date_updated":"2017-10-30","data_source":"Exploit-DB","source_url":"http://srcincite.io/advisories/src-2017-0028/"}],"severity_range_score":"6.4 - 7.1","exploitability":"2.0","weighted_severity":"6.4","risk_score":10.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45wy-ban5-qqg8"}