{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85268?format=json","vulnerability_id":"VCID-6t46-7fea-dyav","summary":"JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix","aliases":[{"alias":"CVE-2016-0363"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/115346?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/115341?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1?arch=el6_7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.25-1jpp.1%3Farch=el6_7"},{"url":"http://public2.vulnerablecode.io/api/packages/115344?format=json","purl":"pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.9.40-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.9.40-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/115343?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/115342?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1?arch=el6_7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.3.40-1jpp.1%3Farch=el6_7"},{"url":"http://public2.vulnerablecode.io/api/packages/113170?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1?arch=el6_8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pew-7np4-vqfu"},{"vulnerability":"VCID-2krr-m59b-77a7"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6383-1rzy-9kcr"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6xgm-xhae-3bbv"},{"vulnerability":"VCID-7ez7-vdry-wbep"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-ar8p-z4ww-wuau"},{"vulnerability":"VCID-b15r-cqd5-rugd"},{"vulnerability":"VCID-c7sa-v6cu-d3ex"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-e2zb-3859-qfe6"},{"vulnerability":"VCID-ftnn-eurn-wydw"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-k3pa-xdxn-ubbg"},{"vulnerability":"VCID-kzak-fju8-eqew"},{"vulnerability":"VCID-n1wv-bkbb-gugt"},{"vulnerability":"VCID-n3s6-1ba7-47g7"},{"vulnerability":"VCID-qp1y-5scd-c7hy"},{"vulnerability":"VCID-qs1s-6yjm-jye5"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-snqh-ebq3-hubn"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-tc8v-xrjj-hucq"},{"vulnerability":"VCID-u3rj-qyrr-vkbw"},{"vulnerability":"VCID-v64t-4c46-3bhj"},{"vulnerability":"VCID-x54g-mhs4-mug4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1%3Farch=el6_8"},{"url":"http://public2.vulnerablecode.io/api/packages/115345?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/115347?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.3.0-1jpp.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/115348?format=json","purl":"pkg:rpm/redhat/spacewalk-java@2.0.2-109?arch=el5sat","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spacewalk-java@2.0.2-109%3Farch=el5sat"},{"url":"http://public2.vulnerablecode.io/api/packages/115349?format=json","purl":"pkg:rpm/redhat/spacewalk-java@2.3.8-146?arch=el6sat","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1m2k-jt6j-kyam"},{"vulnerability":"VCID-2v3q-7u91-syh3"},{"vulnerability":"VCID-46bb-rmw3-47c5"},{"vulnerability":"VCID-4p3u-gdhr-jucj"},{"vulnerability":"VCID-4ptw-ap8n-bkf2"},{"vulnerability":"VCID-5u17-kgsw-akar"},{"vulnerability":"VCID-6t46-7fea-dyav"},{"vulnerability":"VCID-6y1r-9shn-abdp"},{"vulnerability":"VCID-7y2q-c6xs-nbex"},{"vulnerability":"VCID-8edn-xjyj-9fgf"},{"vulnerability":"VCID-8rd3-zh7k-17bh"},{"vulnerability":"VCID-9d14-kqac-nbbt"},{"vulnerability":"VCID-9gpf-rkqa-2fb4"},{"vulnerability":"VCID-a326-kbt5-h7bp"},{"vulnerability":"VCID-ajs9-y6dt-5fhj"},{"vulnerability":"VCID-au4s-5j9w-nybx"},{"vulnerability":"VCID-b9wa-u375-xuef"},{"vulnerability":"VCID-cmr5-b3n9-6uhu"},{"vulnerability":"VCID-cu24-1rcd-93g3"},{"vulnerability":"VCID-e4dr-2bah-k7bp"},{"vulnerability":"VCID-gted-bme5-r7gf"},{"vulnerability":"VCID-j35a-btuq-83hs"},{"vulnerability":"VCID-j8w9-x9f9-hfec"},{"vulnerability":"VCID-jccp-8k75-xkhn"},{"vulnerability":"VCID-jj9j-kwv8-byba"},{"vulnerability":"VCID-kahp-6ybn-9yax"},{"vulnerability":"VCID-knv6-1uv9-yfcy"},{"vulnerability":"VCID-nv52-jzcr-37ay"},{"vulnerability":"VCID-pvgc-ckyg-jfhm"},{"vulnerability":"VCID-qb56-zfz8-4bev"},{"vulnerability":"VCID-qs56-bnkb-buhu"},{"vulnerability":"VCID-qup9-qy11-fqhe"},{"vulnerability":"VCID-r691-77bt-skhe"},{"vulnerability":"VCID-r7cu-ewk5-pygd"},{"vulnerability":"VCID-taqg-ukr5-ybbk"},{"vulnerability":"VCID-u5jr-jf83-gbbb"},{"vulnerability":"VCID-vf65-ugfc-nueg"},{"vulnerability":"VCID-wbup-e69y-3fgh"},{"vulnerability":"VCID-wqcq-rktw-jyct"},{"vulnerability":"VCID-yga5-gj6n-byga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spacewalk-java@2.3.8-146%3Farch=el6sat"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363","reference_id":"","reference_type":"","scores":[{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67997","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67906","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71691","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.7163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0363"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/20","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/20"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/3","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/3"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21980826"},{"reference_url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf"},{"reference_url":"http://www.securityfocus.com/bid/85895","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85895"},{"reference_url":"http://www.securitytracker.com/id/1035953","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044","reference_id":"1324044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_id":"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363","reference_id":"CVE-2016-0363","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0701","reference_id":"RHSA-2016:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0702","reference_id":"RHSA-2016:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0708","reference_id":"RHSA-2016:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0716","reference_id":"RHSA-2016:0716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1039","reference_id":"RHSA-2016:1039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[],"severity_range_score":"6.8 - 8.1","exploitability":"0.5","weighted_severity":"7.3","risk_score":3.6,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t46-7fea-dyav"}