Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/openjpeg2@2.4.0-4?arch=el8
Typerpm
Namespaceredhat
Nameopenjpeg2
Version2.4.0-4
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2272-j2kp-x3du
vulnerability_id VCID-2272-j2kp-x3du
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12973
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16431
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16531
published_at 2026-04-11T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16492
published_at 2026-04-12T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16434
published_at 2026-04-13T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16374
published_at 2026-04-16T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16393
published_at 2026-04-18T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16845
published_at 2026-04-08T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16902
published_at 2026-04-09T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16747
published_at 2026-04-01T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16974
published_at 2026-04-04T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-07T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16917
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12973
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732270
reference_id 1732270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732270
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292
reference_id 931292
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292
6
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
7
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
8
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
9
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
10
reference_url https://usn.ubuntu.com/4497-1/
reference_id USN-4497-1
reference_type
scores
url https://usn.ubuntu.com/4497-1/
11
reference_url https://usn.ubuntu.com/USN-4782-1/
reference_id USN-USN-4782-1
reference_type
scores
url https://usn.ubuntu.com/USN-4782-1/
fixed_packages
aliases CVE-2019-12973
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2272-j2kp-x3du
1
url VCID-2ad2-5t5w-d7ew
vulnerability_id VCID-2ad2-5t5w-d7ew
summary openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27824
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.3535
published_at 2026-04-21T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35403
published_at 2026-04-18T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50798
published_at 2026-04-01T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50854
published_at 2026-04-02T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.5088
published_at 2026-04-04T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50837
published_at 2026-04-07T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50895
published_at 2026-04-13T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50892
published_at 2026-04-09T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50934
published_at 2026-04-11T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50912
published_at 2026-04-12T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50933
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1905723
reference_id 1905723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1905723
14
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
15
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27824
reference_id CVE-2020-27824
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27824
17
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
18
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
19
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
20
reference_url https://usn.ubuntu.com/4880-1/
reference_id USN-4880-1
reference_type
scores
url https://usn.ubuntu.com/4880-1/
21
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
22
reference_url https://usn.ubuntu.com/USN-5664-1/
reference_id USN-USN-5664-1
reference_type
scores
url https://usn.ubuntu.com/USN-5664-1/
fixed_packages
aliases CVE-2020-27824
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ad2-5t5w-d7ew
2
url VCID-3r1m-53dp-yff2
vulnerability_id VCID-3r1m-53dp-yff2
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27842
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29845
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29714
published_at 2026-04-21T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29779
published_at 2026-04-16T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2989
published_at 2026-04-02T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29938
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2975
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29812
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29847
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29856
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.2981
published_at 2026-04-12T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1907513
reference_id 1907513
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1907513
14
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
15
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27842
reference_id CVE-2020-27842
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27842
17
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
18
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
19
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
20
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
21
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-27842
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1m-53dp-yff2
3
url VCID-an46-hxt9-57e1
vulnerability_id VCID-an46-hxt9-57e1
summary
Out-of-bounds Write
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3575
reference_id
reference_type
scores
0
value 0.0033
scoring_system epss
scoring_elements 0.5588
published_at 2026-04-01T12:55:00Z
1
value 0.0033
scoring_system epss
scoring_elements 0.5596
published_at 2026-04-21T12:55:00Z
2
value 0.0033
scoring_system epss
scoring_elements 0.56054
published_at 2026-04-16T12:55:00Z
3
value 0.0033
scoring_system epss
scoring_elements 0.56057
published_at 2026-04-18T12:55:00Z
4
value 0.0033
scoring_system epss
scoring_elements 0.55991
published_at 2026-04-07T12:55:00Z
5
value 0.0033
scoring_system epss
scoring_elements 0.56013
published_at 2026-04-04T12:55:00Z
6
value 0.0033
scoring_system epss
scoring_elements 0.56042
published_at 2026-04-08T12:55:00Z
7
value 0.0033
scoring_system epss
scoring_elements 0.56045
published_at 2026-04-09T12:55:00Z
8
value 0.0033
scoring_system epss
scoring_elements 0.56056
published_at 2026-04-11T12:55:00Z
9
value 0.0033
scoring_system epss
scoring_elements 0.56036
published_at 2026-04-12T12:55:00Z
10
value 0.0033
scoring_system epss
scoring_elements 0.56018
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3575
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1957616
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1957616
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/uclouvain/openjpeg/issues/1347
reference_id
reference_type
scores
url https://github.com/uclouvain/openjpeg/issues/1347
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775
reference_id 989775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775
7
reference_url https://security.archlinux.org/AVG-2850
reference_id AVG-2850
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2850
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3575
reference_id CVE-2021-3575
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3575
9
reference_url https://ubuntu.com/security/CVE-2021-3575
reference_id CVE-2021-3575
reference_type
scores
url https://ubuntu.com/security/CVE-2021-3575
10
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
11
reference_url https://usn.ubuntu.com/7083-1/
reference_id USN-7083-1
reference_type
scores
url https://usn.ubuntu.com/7083-1/
fixed_packages
aliases CVE-2021-3575
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-an46-hxt9-57e1
4
url VCID-ecez-3pwt-pudf
vulnerability_id VCID-ecez-3pwt-pudf
summary openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20845
reference_id
reference_type
scores
0
value 0.00609
scoring_system epss
scoring_elements 0.69659
published_at 2026-04-01T12:55:00Z
1
value 0.00609
scoring_system epss
scoring_elements 0.69671
published_at 2026-04-02T12:55:00Z
2
value 0.00609
scoring_system epss
scoring_elements 0.69687
published_at 2026-04-04T12:55:00Z
3
value 0.00609
scoring_system epss
scoring_elements 0.69664
published_at 2026-04-07T12:55:00Z
4
value 0.00609
scoring_system epss
scoring_elements 0.69714
published_at 2026-04-08T12:55:00Z
5
value 0.00609
scoring_system epss
scoring_elements 0.69731
published_at 2026-04-09T12:55:00Z
6
value 0.00609
scoring_system epss
scoring_elements 0.69752
published_at 2026-04-11T12:55:00Z
7
value 0.00609
scoring_system epss
scoring_elements 0.69737
published_at 2026-04-12T12:55:00Z
8
value 0.00609
scoring_system epss
scoring_elements 0.69724
published_at 2026-04-13T12:55:00Z
9
value 0.00609
scoring_system epss
scoring_elements 0.69764
published_at 2026-04-16T12:55:00Z
10
value 0.00609
scoring_system epss
scoring_elements 0.69773
published_at 2026-04-18T12:55:00Z
11
value 0.00609
scoring_system epss
scoring_elements 0.69754
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728505
reference_id 1728505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728505
5
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
6
reference_url https://usn.ubuntu.com/USN-4782-1/
reference_id USN-USN-4782-1
reference_type
scores
url https://usn.ubuntu.com/USN-4782-1/
fixed_packages
aliases CVE-2018-20845
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecez-3pwt-pudf
5
url VCID-hxax-t3zc-8kax
vulnerability_id VCID-hxax-t3zc-8kax
summary openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5727
reference_id
reference_type
scores
0
value 0.00724
scoring_system epss
scoring_elements 0.72503
published_at 2026-04-07T12:55:00Z
1
value 0.00724
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-02T12:55:00Z
2
value 0.00724
scoring_system epss
scoring_elements 0.72527
published_at 2026-04-04T12:55:00Z
3
value 0.00724
scoring_system epss
scoring_elements 0.72542
published_at 2026-04-08T12:55:00Z
4
value 0.00724
scoring_system epss
scoring_elements 0.72554
published_at 2026-04-09T12:55:00Z
5
value 0.00724
scoring_system epss
scoring_elements 0.72578
published_at 2026-04-11T12:55:00Z
6
value 0.00724
scoring_system epss
scoring_elements 0.72561
published_at 2026-04-12T12:55:00Z
7
value 0.00724
scoring_system epss
scoring_elements 0.72551
published_at 2026-04-13T12:55:00Z
8
value 0.00724
scoring_system epss
scoring_elements 0.72594
published_at 2026-04-21T12:55:00Z
9
value 0.00724
scoring_system epss
scoring_elements 0.72603
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1536552
reference_id 1536552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1536552
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532
reference_id 888532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532
6
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
7
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
8
reference_url https://usn.ubuntu.com/USN-4782-1/
reference_id USN-USN-4782-1
reference_type
scores
url https://usn.ubuntu.com/USN-4782-1/
fixed_packages
aliases CVE-2018-5727
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxax-t3zc-8kax
6
url VCID-j8et-rm1k-xkhg
vulnerability_id VCID-j8et-rm1k-xkhg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5785
reference_id
reference_type
scores
0
value 0.00684
scoring_system epss
scoring_elements 0.71615
published_at 2026-04-01T12:55:00Z
1
value 0.00684
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-02T12:55:00Z
2
value 0.00684
scoring_system epss
scoring_elements 0.71639
published_at 2026-04-04T12:55:00Z
3
value 0.00684
scoring_system epss
scoring_elements 0.71612
published_at 2026-04-07T12:55:00Z
4
value 0.00684
scoring_system epss
scoring_elements 0.71652
published_at 2026-04-08T12:55:00Z
5
value 0.00684
scoring_system epss
scoring_elements 0.71662
published_at 2026-04-09T12:55:00Z
6
value 0.00684
scoring_system epss
scoring_elements 0.71686
published_at 2026-04-11T12:55:00Z
7
value 0.00684
scoring_system epss
scoring_elements 0.71669
published_at 2026-04-12T12:55:00Z
8
value 0.00684
scoring_system epss
scoring_elements 0.71651
published_at 2026-04-13T12:55:00Z
9
value 0.00684
scoring_system epss
scoring_elements 0.71695
published_at 2026-04-16T12:55:00Z
10
value 0.00684
scoring_system epss
scoring_elements 0.71701
published_at 2026-04-18T12:55:00Z
11
value 0.00684
scoring_system epss
scoring_elements 0.71682
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5785
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1537758
reference_id 1537758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1537758
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533
reference_id 888533
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533
10
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
11
reference_url https://usn.ubuntu.com/4109-1/
reference_id USN-4109-1
reference_type
scores
url https://usn.ubuntu.com/4109-1/
fixed_packages
aliases CVE-2018-5785
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8et-rm1k-xkhg
7
url VCID-kq91-13ek-rkcu
vulnerability_id VCID-kq91-13ek-rkcu
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15389
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-01T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57016
published_at 2026-04-21T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57041
published_at 2026-04-16T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.57039
published_at 2026-04-18T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.56995
published_at 2026-04-02T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57017
published_at 2026-04-04T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.56994
published_at 2026-04-07T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57045
published_at 2026-04-08T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57047
published_at 2026-04-09T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57058
published_at 2026-04-11T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.57037
published_at 2026-04-12T12:55:00Z
11
value 0.00344
scoring_system epss
scoring_elements 0.57013
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15389
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1852869
reference_id 1852869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1852869
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220
reference_id 965220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220
15
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
16
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15389
reference_id CVE-2020-15389
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-15389
18
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
19
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
20
reference_url https://usn.ubuntu.com/4497-1/
reference_id USN-4497-1
reference_type
scores
url https://usn.ubuntu.com/4497-1/
21
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
22
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-15389
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kq91-13ek-rkcu
8
url VCID-pzv2-p44c-8qg4
vulnerability_id VCID-pzv2-p44c-8qg4
summary Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29338
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26175
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26035
published_at 2026-04-21T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26092
published_at 2026-04-16T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-18T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26256
published_at 2026-04-02T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26297
published_at 2026-04-04T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26067
published_at 2026-04-07T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26134
published_at 2026-04-08T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26182
published_at 2026-04-09T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.2619
published_at 2026-04-11T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26144
published_at 2026-04-12T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.26086
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950101
reference_id 1950101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950101
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276
reference_id 987276
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276
6
reference_url https://security.archlinux.org/AVG-1390
reference_id AVG-1390
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1390
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-29338
reference_id CVE-2021-29338
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-29338
8
reference_url https://security.gentoo.org/glsa/202209-04
reference_id GLSA-202209-04
reference_type
scores
url https://security.gentoo.org/glsa/202209-04
9
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
10
reference_url https://usn.ubuntu.com/7083-1/
reference_id USN-7083-1
reference_type
scores
url https://usn.ubuntu.com/7083-1/
fixed_packages
aliases CVE-2021-29338
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzv2-p44c-8qg4
9
url VCID-u497-trj1-rfdj
vulnerability_id VCID-u497-trj1-rfdj
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27814
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43658
published_at 2026-04-01T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43684
published_at 2026-04-21T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.4376
published_at 2026-04-16T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43752
published_at 2026-04-18T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43715
published_at 2026-04-02T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.4374
published_at 2026-04-04T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43674
published_at 2026-04-07T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43724
published_at 2026-04-08T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43727
published_at 2026-04-09T12:55:00Z
9
value 0.00212
scoring_system epss
scoring_elements 0.43747
published_at 2026-04-11T12:55:00Z
10
value 0.00212
scoring_system epss
scoring_elements 0.43716
published_at 2026-04-12T12:55:00Z
11
value 0.00212
scoring_system epss
scoring_elements 0.43699
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/uclouvain/openjpeg/issues/1283
reference_id
reference_type
scores
url https://github.com/uclouvain/openjpeg/issues/1283
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901998
reference_id 1901998
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901998
15
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
16
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27814
reference_id CVE-2020-27814
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27814
18
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
19
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
20
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
21
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
22
reference_url https://usn.ubuntu.com/4880-1/
reference_id USN-4880-1
reference_type
scores
url https://usn.ubuntu.com/4880-1/
23
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-27814
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u497-trj1-rfdj
10
url VCID-whsh-5urk-b3ap
vulnerability_id VCID-whsh-5urk-b3ap
summary openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27823
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14051
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.13953
published_at 2026-04-21T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.13882
published_at 2026-04-16T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.13874
published_at 2026-04-18T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14132
published_at 2026-04-02T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14188
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14004
published_at 2026-04-07T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14086
published_at 2026-04-08T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14139
published_at 2026-04-09T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14082
published_at 2026-04-11T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.1404
published_at 2026-04-12T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.13988
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1905762
reference_id 1905762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1905762
14
reference_url https://security.archlinux.org/AVG-1980
reference_id AVG-1980
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1980
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27823
reference_id CVE-2020-27823
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27823
16
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
17
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
18
reference_url https://usn.ubuntu.com/4880-1/
reference_id USN-4880-1
reference_type
scores
url https://usn.ubuntu.com/4880-1/
19
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-27823
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whsh-5urk-b3ap
11
url VCID-xc4v-2aa6-yfd6
vulnerability_id VCID-xc4v-2aa6-yfd6
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27843
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.32926
published_at 2026-04-01T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.32917
published_at 2026-04-21T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32976
published_at 2026-04-16T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32954
published_at 2026-04-18T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33055
published_at 2026-04-02T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33088
published_at 2026-04-04T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-07T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32964
published_at 2026-04-08T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32994
published_at 2026-04-09T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.32997
published_at 2026-04-11T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32959
published_at 2026-04-12T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.32934
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1907516
reference_id 1907516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1907516
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663
reference_id 983663
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663
15
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
16
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27843
reference_id CVE-2020-27843
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27843
18
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
19
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
20
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
21
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
22
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-27843
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xc4v-2aa6-yfd6
12
url VCID-xvjg-5z4m-pqdv
vulnerability_id VCID-xvjg-5z4m-pqdv
summary openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20847
reference_id
reference_type
scores
0
value 0.00724
scoring_system epss
scoring_elements 0.72591
published_at 2026-04-21T12:55:00Z
1
value 0.00724
scoring_system epss
scoring_elements 0.72575
published_at 2026-04-11T12:55:00Z
2
value 0.00724
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-12T12:55:00Z
3
value 0.00724
scoring_system epss
scoring_elements 0.72548
published_at 2026-04-13T12:55:00Z
4
value 0.00724
scoring_system epss
scoring_elements 0.7259
published_at 2026-04-16T12:55:00Z
5
value 0.00724
scoring_system epss
scoring_elements 0.726
published_at 2026-04-18T12:55:00Z
6
value 0.00738
scoring_system epss
scoring_elements 0.72799
published_at 2026-04-02T12:55:00Z
7
value 0.00738
scoring_system epss
scoring_elements 0.72792
published_at 2026-04-01T12:55:00Z
8
value 0.00738
scoring_system epss
scoring_elements 0.72833
published_at 2026-04-08T12:55:00Z
9
value 0.00738
scoring_system epss
scoring_elements 0.72847
published_at 2026-04-09T12:55:00Z
10
value 0.00738
scoring_system epss
scoring_elements 0.72819
published_at 2026-04-04T12:55:00Z
11
value 0.00738
scoring_system epss
scoring_elements 0.72795
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20847
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728509
reference_id 1728509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728509
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294
reference_id 931294
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294
6
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
7
reference_url https://usn.ubuntu.com/4497-1/
reference_id USN-4497-1
reference_type
scores
url https://usn.ubuntu.com/4497-1/
fixed_packages
aliases CVE-2018-20847
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvjg-5z4m-pqdv
13
url VCID-zgaa-57ak-jbex
vulnerability_id VCID-zgaa-57ak-jbex
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27845
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29845
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29714
published_at 2026-04-21T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29779
published_at 2026-04-16T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2989
published_at 2026-04-02T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29938
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2975
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29812
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29847
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29856
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.2981
published_at 2026-04-12T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1907523
reference_id 1907523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1907523
14
reference_url https://security.archlinux.org/ASA-202012-21
reference_id ASA-202012-21
reference_type
scores
url https://security.archlinux.org/ASA-202012-21
15
reference_url https://security.archlinux.org/AVG-1339
reference_id AVG-1339
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1339
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-27845
reference_id CVE-2020-27845
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-27845
17
reference_url https://security.gentoo.org/glsa/202101-29
reference_id GLSA-202101-29
reference_type
scores
url https://security.gentoo.org/glsa/202101-29
18
reference_url https://access.redhat.com/errata/RHSA-2021:4251
reference_id RHSA-2021:4251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4251
19
reference_url https://usn.ubuntu.com/4685-1/
reference_id USN-4685-1
reference_type
scores
url https://usn.ubuntu.com/4685-1/
20
reference_url https://usn.ubuntu.com/4686-1/
reference_id USN-4686-1
reference_type
scores
url https://usn.ubuntu.com/4686-1/
21
reference_url https://usn.ubuntu.com/4880-1/
reference_id USN-4880-1
reference_type
scores
url https://usn.ubuntu.com/4880-1/
22
reference_url https://usn.ubuntu.com/5952-1/
reference_id USN-5952-1
reference_type
scores
url https://usn.ubuntu.com/5952-1/
fixed_packages
aliases CVE-2020-27845
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgaa-57ak-jbex
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openjpeg2@2.4.0-4%3Farch=el8