{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85199?format=json","vulnerability_id":"VCID-4ptw-ap8n-bkf2","summary":"JDK: buffer overflow vulnerability in the IBM JVM","aliases":[{"alias":"CVE-2016-0264"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/115346?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/115341?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1?arch=el6_7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1%3Farch=el6_7"},{"url":"http://public2.vulnerablecode.io/api/packages/115344?format=json","purl":"pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.9.40-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.9.40-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/115342?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1?arch=el6_7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1%3Farch=el6_7"},{"url":"http://public2.vulnerablecode.io/api/packages/115343?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/113170?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1?arch=el6_8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pew-7np4-vqfu"},{"vulnerability":"VCID-2krr-m59b-77a7"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6383-1rzy-9kcr"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6xgm-xhae-3bbv"},{"vulnerability":"VCID-7ez7-vdry-wbep"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-ar8p-z4ww-wuau"},{"vulnerability":"VCID-b15r-cqd5-rugd"},{"vulnerability":"VCID-c7sa-v6cu-d3ex"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-e2zb-3859-qfe6"},{"vulnerability":"VCID-ftnn-eurn-wydw"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-k3pa-xdxn-ubbg"},{"vulnerability":"VCID-kzak-fju8-eqew"},{"vulnerability":"VCID-n1wv-bkbb-gugt"},{"vulnerability":"VCID-n3s6-1ba7-47g7"},{"vulnerability":"VCID-qp1y-5scd-c7hy"},{"vulnerability":"VCID-qs1s-6yjm-jye5"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-snqh-ebq3-hubn"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-tc8v-xrjj-hucq"},{"vulnerability":"VCID-u3rj-qyrr-vkbw"},{"vulnerability":"VCID-v64t-4c46-3bhj"},{"vulnerability":"VCID-x54g-mhs4-mug4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1%3Farch=el6_8"},{"url":"http://public2.vulnerablecode.io/api/packages/115345?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/115347?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/115348?format=json","purl":"pkg:rpm/redhat/spacewalk-java@2.0.2-109?arch=el5sat","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spacewalk-java@2.0.2-109%3Farch=el5sat"},{"url":"http://public2.vulnerablecode.io/api/packages/115349?format=json","purl":"pkg:rpm/redhat/spacewalk-java@2.3.8-146?arch=el6sat","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spacewalk-java@2.3.8-146%3Farch=el6sat"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264","reference_id":"","reference_type":"","scores":[{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.93999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12796","scoring_system":"epss","scoring_elements":"0.94008","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359","reference_id":"1331359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264","reference_id":"CVE-2016-0264","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"weaknesses":[{"cwe_id":120,"name":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","description":"The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow."},{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"5.1 - 6.8","exploitability":"0.5","weighted_severity":"6.1","risk_score":3.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ptw-ap8n-bkf2"}