Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 9.8
https://developer.ibm.com/javasdk/support/security-vulnerabilities/
https://access.redhat.com/errata/RHSA-2015:0264
https://access.redhat.com/security/cve/cve-2014-4262
https://access.redhat.com/security/cve/cve-2014-4263
https://access.redhat.com/security/cve/cve-2014-4252
https://access.redhat.com/security/cve/cve-2014-4244
https://access.redhat.com/security/cve/cve-2014-4219
https://access.redhat.com/security/cve/cve-2014-4218
https://access.redhat.com/security/cve/cve-2014-4209
https://access.redhat.com/security/cve/cve-2014-4265
https://access.redhat.com/security/cve/cve-2014-4227
https://access.redhat.com/security/cve/cve-2014-6502
https://access.redhat.com/security/cve/cve-2014-6457
https://access.redhat.com/security/cve/cve-2014-6506
https://access.redhat.com/security/cve/cve-2014-6531
https://access.redhat.com/security/cve/cve-2014-6558
https://access.redhat.com/security/cve/cve-2014-6511
https://access.redhat.com/security/cve/cve-2014-6512
https://access.redhat.com/security/cve/cve-2014-6503
https://access.redhat.com/security/cve/cve-2014-6532
https://access.redhat.com/security/cve/cve-2014-4288
https://access.redhat.com/security/cve/cve-2014-6458
https://access.redhat.com/security/cve/cve-2014-6493
https://access.redhat.com/security/cve/cve-2014-6492
https://access.redhat.com/security/cve/cve-2014-6515
https://access.redhat.com/security/cve/cve-2014-3566
https://access.redhat.com/security/cve/cve-2014-3065
https://access.redhat.com/security/cve/cve-2014-3068
https://access.redhat.com/security/cve/cve-2015-0406
https://access.redhat.com/security/cve/cve-2015-0403
https://access.redhat.com/security/cve/cve-2015-0408
https://access.redhat.com/security/cve/cve-2015-0407
https://access.redhat.com/security/cve/cve-2015-0395
https://access.redhat.com/security/cve/cve-2015-0410
https://access.redhat.com/security/cve/cve-2014-6591
https://access.redhat.com/security/cve/cve-2014-6593
https://access.redhat.com/security/cve/cve-2014-6587
https://access.redhat.com/security/cve/cve-2015-0412
https://access.redhat.com/security/cve/cve-2014-6585