Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035809?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "type": "deb", "namespace": "debian", "name": "openjpeg2", "version": "2.1.0-2+deb8u3", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.5.0-2+deb12u2", "latest_non_vulnerable_version": "2.5.0-2+deb12u2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82455?format=api", "vulnerability_id": "VCID-1z5a-aa47-dyft", "summary": "openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20846", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63784", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63908", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63897", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6391", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63863", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728513", "reference_id": "1728513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728513" }, { "reference_url": "https://security.archlinux.org/AVG-1390", "reference_id": "AVG-1390", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1390" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20846" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5a-aa47-dyft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40226?format=api", "vulnerability_id": "VCID-2272-j2kp-x3du", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12973", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16492", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16434", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16393", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16917", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732270", "reference_id": "1732270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732270" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292", "reference_id": "931292", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2019-12973" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2272-j2kp-x3du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80758?format=api", "vulnerability_id": "VCID-2ad2-5t5w-d7ew", "summary": "openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35403", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.5088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50934", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50933", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723", "reference_id": "1905723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824", "reference_id": "CVE-2020-27824", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27824" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ad2-5t5w-d7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40238?format=api", "vulnerability_id": "VCID-3r1m-53dp-yff2", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513", "reference_id": "1907513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842", "reference_id": "CVE-2020-27842", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27842" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1m-53dp-yff2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85178?format=api", "vulnerability_id": "VCID-454c-fk3j-g7aa", "summary": "openjpeg: Heap buffer overflow in function color_cmyk_to_rgb in color.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4796", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48908", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48976", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48974", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49017", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48978", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4796" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335482", "reference_id": "1335482", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335482" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-4796" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-454c-fk3j-g7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40236?format=api", "vulnerability_id": "VCID-4hbk-qsje-63fd", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3025", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3039", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30253", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510", "reference_id": "1907510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841", "reference_id": "CVE-2020-27841", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27841" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4hbk-qsje-63fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92688?format=api", "vulnerability_id": "VCID-4qgw-3tgj-4kas", "summary": "Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74553", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74462", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74492", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74535", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1239" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=430891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=430891" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=457493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=457493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1239", "reference_id": "CVE-2015-1239", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1239" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2015-1239" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qgw-3tgj-4kas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81622?format=api", "vulnerability_id": "VCID-5x4u-vqvr-bfhw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78593", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.786", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78637", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.7865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.7867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78667", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381268", "reference_id": "1381268", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381268" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-8332" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5x4u-vqvr-bfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58975?format=api", "vulnerability_id": "VCID-6fte-2hrw-z3eb", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73166", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73171", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73221", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73246", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73265", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372219", "reference_id": "1372219", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372219" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5158" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fte-2hrw-z3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60044?format=api", "vulnerability_id": "VCID-6m6f-5tup-pbay", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88881", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88878", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487376", "reference_id": "1487376", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487376" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-10506" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6m6f-5tup-pbay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81676?format=api", "vulnerability_id": "VCID-7ath-fa35-5uca", "summary": "openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511", "reference_id": "1790511", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000", "reference_id": "950000", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851", "reference_id": "CVE-2020-6851", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0262", "reference_id": "RHSA-2020:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0274", "reference_id": "RHSA-2020:0274", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0296", "reference_id": "RHSA-2020:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0296" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-6851" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ath-fa35-5uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63485?format=api", "vulnerability_id": "VCID-7vw2-fcqu-8bae", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77949", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77967", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.7796", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389", "reference_id": "1487389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431", "reference_id": "874431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14152" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vw2-fcqu-8bae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80952?format=api", "vulnerability_id": "VCID-8ruh-x3eq-rffk", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66148", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66223", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374329", "reference_id": "1374329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374329" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604", "reference_id": "837604", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-7163" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ruh-x3eq-rffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62380?format=api", "vulnerability_id": "VCID-9ezw-mty9-z3cv", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80211", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80208", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80175", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80179", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770", "reference_id": "1335770", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149", "reference_id": "800149", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2015-8871" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80951?format=api", "vulnerability_id": "VCID-9f84-54j5-abbf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84822", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84903", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.8492", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84918", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267983", "reference_id": "1267983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267983" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453", "reference_id": "800453", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2015-6581" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9f84-54j5-abbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85283?format=api", "vulnerability_id": "VCID-9sk8-qkrw-5bdj", "summary": "openjpeg: Division-by-zero in function opj_tcd_init_tile in tcd.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51914", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.5185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51865", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.519", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.51927", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335483", "reference_id": "1335483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335483" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-4797" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sk8-qkrw-5bdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13138?format=api", "vulnerability_id": "VCID-an46-hxt9-57e1", "summary": "Out-of-bounds Write\nA heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5596", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55991", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56018", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3575" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1347" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775", "reference_id": "989775", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775" }, { "reference_url": "https://security.archlinux.org/AVG-2850", "reference_id": "AVG-2850", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2850" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3575", "reference_id": "CVE-2021-3575", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3575" }, { "reference_url": "https://ubuntu.com/security/CVE-2021-3575", "reference_id": "CVE-2021-3575", "reference_type": "", "scores": [], "url": "https://ubuntu.com/security/CVE-2021-3575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-3575" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-an46-hxt9-57e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58973?format=api", "vulnerability_id": "VCID-bxq4-958j-gybu", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5157.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5157.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91158", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91165", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91167", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06592", "scoring_system": "epss", "scoring_elements": "0.91194", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372218", "reference_id": "1372218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372218" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5157" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bxq4-958j-gybu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60056?format=api", "vulnerability_id": "VCID-c6g2-dknk-u3cy", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.7758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77615", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77626", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.7766", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77654", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402711", "reference_id": "1402711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402711" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422", "reference_id": "851422", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-9573" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6g2-dknk-u3cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60045?format=api", "vulnerability_id": "VCID-cgjw-v1jx-1qg3", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10507.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10507.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70836", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.7088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70919", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70903", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70933", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487377", "reference_id": "1487377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487377" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-10507" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgjw-v1jx-1qg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72596?format=api", "vulnerability_id": "VCID-cgvq-jt8a-4yba", "summary": "openjpeg: heap buffer overflow in bin/common/color.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10539", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10444", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675", "reference_id": "1092675", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1563", "reference_id": "1563", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335172", "reference_id": "2335172", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335172" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-56826", "reference_id": "CVE-2024-56826", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-56826" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8", "reference_id": "e492644fbded4c820ca55b5e50e598d346e850e8", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7309", "reference_id": "RHSA-2025:7309", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7309" }, { "reference_url": "https://usn.ubuntu.com/7223-1/", "reference_id": "USN-7223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7223-1/" }, { "reference_url": "https://usn.ubuntu.com/7623-1/", "reference_id": "USN-7623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7623-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2024-56826" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvq-jt8a-4yba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58950?format=api", "vulnerability_id": "VCID-cmhu-2x4c-pqfk", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.8098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81004", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81037", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81054", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81071", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81069", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363982", "reference_id": "1363982", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363982" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1580", "reference_id": "RHSA-2016:1580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5139" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmhu-2x4c-pqfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58966?format=api", "vulnerability_id": "VCID-drgt-8maa-xqgv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76984", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213", "reference_id": "1372213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-5152" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drgt-8maa-xqgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62381?format=api", "vulnerability_id": "VCID-dvse-ce3w-p7da", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64581", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64596", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6451", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64575", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64578", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6455", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299767", "reference_id": "1299767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299767" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1923", "reference_id": "CVE-2016-1923", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1923" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-1923" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvse-ce3w-p7da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=api", "vulnerability_id": "VCID-e76r-pz11-yfhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7053", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571480" }, { "reference_url": "https://codereview.chromium.org/1583233008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1583233008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156", "reference_id": "1306156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626", "reference_id": "CVE-2016-1626", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1626" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60048?format=api", "vulnerability_id": "VCID-eavm-6anm-nfgu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73752", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73767", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73776", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418147", "reference_id": "1418147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418147" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551", "reference_id": "844551", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-9112" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eavm-6anm-nfgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82453?format=api", "vulnerability_id": "VCID-ecez-3pwt-pudf", "summary": "openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69671", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69752", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69737", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69754", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728505", "reference_id": "1728505", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20845" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecez-3pwt-pudf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83807?format=api", "vulnerability_id": "VCID-fc33-x3z3-tyde", "summary": "openjpeg: Stack-buffer overflow in the pgxtoimage function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90136", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90094", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1044" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525086", "reference_id": "1525086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525086" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17479", "reference_id": "CVE-2017-17479", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17479" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-17479" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc33-x3z3-tyde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60060?format=api", "vulnerability_id": "VCID-fq9r-fneu-1fhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71574", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768", "reference_id": "1487768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118", "reference_id": "874118", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14039" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9r-fneu-1fhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83735?format=api", "vulnerability_id": "VCID-hxax-t3zc-8kax", "summary": "openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72503", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72561", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72594", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72603", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536552", "reference_id": "1536552", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536552" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532", "reference_id": "888532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-5727" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxax-t3zc-8kax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70432?format=api", "vulnerability_id": "VCID-j8et-rm1k-xkhg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71695", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71701", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71682", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537758", "reference_id": "1537758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537758" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533", "reference_id": "888533", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-5785" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8et-rm1k-xkhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60054?format=api", "vulnerability_id": "VCID-jayn-yzet-k7g5", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.679", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.6789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67913", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231", "reference_id": "1390231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557", "reference_id": "844557", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557" }, { "reference_url": "https://security.archlinux.org/AVG-54", "reference_id": "AVG-54", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-54" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-9118" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jayn-yzet-k7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60055?format=api", "vulnerability_id": "VCID-jpxx-3mbf-pyhe", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82692", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402714", "reference_id": "1402714", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402714" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422", "reference_id": "851422", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-9572" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jpxx-3mbf-pyhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=api", "vulnerability_id": "VCID-jqup-3gmb-mqbh", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75715", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571479" }, { "reference_url": "https://codereview.chromium.org/1590593002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1590593002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.debian.org/security/2017/dsa-4013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-4013" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577", "reference_id": "1310577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628", "reference_id": "CVE-2016-1628", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1628" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63484?format=api", "vulnerability_id": "VCID-jvtx-fv51-5bbe", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75804", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.7923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79787", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347", "reference_id": "1487347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115", "reference_id": "874115", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14041" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtx-fv51-5bbe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62382?format=api", "vulnerability_id": "VCID-jwrz-ypan-9bg6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76037", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7601", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3665", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3665" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772", "reference_id": "1299772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924", "reference_id": "CVE-2016-1924", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-1924" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72597?format=api", "vulnerability_id": "VCID-k9dc-cxnp-nug2", "summary": "openjpeg: heap buffer overflow in lib/openjp2/j2k.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11552", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11671", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676", "reference_id": "1092676", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1564", "reference_id": "1564", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1564" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335174", "reference_id": "2335174", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335174" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-56827", "reference_id": "CVE-2024-56827", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-56827" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8", "reference_id": "e492644fbded4c820ca55b5e50e598d346e850e8", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7309", "reference_id": "RHSA-2025:7309", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7309" }, { "reference_url": "https://usn.ubuntu.com/7223-1/", "reference_id": "USN-7223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7223-1/" }, { "reference_url": "https://usn.ubuntu.com/7623-1/", "reference_id": "USN-7623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7623-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2024-56827" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9dc-cxnp-nug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40229?format=api", "vulnerability_id": "VCID-kq91-13ek-rkcu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57013", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869", "reference_id": "1852869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220", "reference_id": "965220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389", "reference_id": "CVE-2020-15389", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-15389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kq91-13ek-rkcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70431?format=api", "vulnerability_id": "VCID-kt1c-6859-v3ej", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88252", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88319", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88306", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1044" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4405" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525088", "reference_id": "1525088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525088" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738", "reference_id": "884738", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17480", "reference_id": "CVE-2017-17480", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17480" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-17480" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt1c-6859-v3ej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81602?format=api", "vulnerability_id": "VCID-mdhg-k4sr-3bg7", "summary": "openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8276", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535", "reference_id": "1800535", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184", "reference_id": "950184", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112", "reference_id": "CVE-2020-8112", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0550", "reference_id": "RHSA-2020:0550", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0550" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0569", "reference_id": "RHSA-2020:0569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0570", "reference_id": "RHSA-2020:0570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0570" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-8112" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdhg-k4sr-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60059?format=api", "vulnerability_id": "VCID-ndpq-xye2-tugw", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62177", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62252", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487236", "reference_id": "1487236", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487236" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-12982" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndpq-xye2-tugw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34492?format=api", "vulnerability_id": "VCID-pzv2-p44c-8qg4", "summary": "Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26035", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26092", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26144", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26086", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950101", "reference_id": "1950101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950101" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276", "reference_id": "987276", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276" }, { "reference_url": "https://security.archlinux.org/AVG-1390", "reference_id": "AVG-1390", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1390" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29338", "reference_id": "CVE-2021-29338", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29338" }, { "reference_url": "https://security.gentoo.org/glsa/202209-04", "reference_id": "GLSA-202209-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-29338" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzv2-p44c-8qg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68426?format=api", "vulnerability_id": "VCID-qyq1-1npp-yyb4", "summary": "openjpeg: Openjpeg NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13898", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15173", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15011", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1505", "reference_id": "1505", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T20:28:33Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1505" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387082", "reference_id": "2387082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387082" }, { "reference_url": "https://usn.ubuntu.com/7757-1/", "reference_id": "USN-7757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7757-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2025-50952" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyq1-1npp-yyb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70433?format=api", "vulnerability_id": "VCID-rm5x-1fp6-mfau", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23781", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23817", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2423", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542321", "reference_id": "1542321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542321" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683", "reference_id": "889683", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-6616" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm5x-1fp6-mfau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62385?format=api", "vulnerability_id": "VCID-t76s-q45b-9ff7", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21324", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21357", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21364", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21332", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317821", "reference_id": "1317821", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317821" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-3183" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t76s-q45b-9ff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70434?format=api", "vulnerability_id": "VCID-tgph-8x71-qbc2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81835", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81795", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.8176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1123" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4405" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609909", "reference_id": "1609909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609909" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873", "reference_id": "904873", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14423", "reference_id": "CVE-2018-14423", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14423" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-14423" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgph-8x71-qbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70435?format=api", "vulnerability_id": "VCID-ttzh-p89a-mkar", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.7118", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71209", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71216", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638558", "reference_id": "1638558", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638558" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763", "reference_id": "910763", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-18088" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttzh-p89a-mkar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34458?format=api", "vulnerability_id": "VCID-txsw-c8hq-suaj", "summary": "Multiple vulnerabilities have been found in Chromium, the worst of\n which can allow remote attackers to cause Denial of Service or gain\n escalated privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01436", "scoring_system": "epss", "scoring_elements": "0.80733", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82093", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.8208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82154", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82186", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01675", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185229", "reference_id": "1185229", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185229" }, { "reference_url": "https://security.gentoo.org/glsa/201502-13", "reference_id": "GLSA-201502-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0093", "reference_id": "RHSA-2015:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0093" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2014-7947" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txsw-c8hq-suaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40231?format=api", "vulnerability_id": "VCID-u497-trj1-rfdj", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43752", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43674", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43699", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998", "reference_id": "1901998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814", "reference_id": "CVE-2020-27814", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27814" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u497-trj1-rfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58977?format=api", "vulnerability_id": "VCID-ubrj-hty6-c3cc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80903", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.8092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80921", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372220", "reference_id": "1372220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372220" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5159" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubrj-hty6-c3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63483?format=api", "vulnerability_id": "VCID-uzpe-dvyu-ckfc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.7534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76049", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361", "reference_id": "1487361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117", "reference_id": "874117", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14040" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzpe-dvyu-ckfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62386?format=api", "vulnerability_id": "VCID-vt59-h7ax-7uca", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83788", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83818", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690", "reference_id": "838690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-7445" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vt59-h7ax-7uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62384?format=api", "vulnerability_id": "VCID-vxw5-nm1p-q3d5", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.5436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54364", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.5446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54443", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54421", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54446", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826", "reference_id": "1317826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-3182" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxw5-nm1p-q3d5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60042?format=api", "vulnerability_id": "VCID-wc6r-1t2c-9qdp", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90756", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90783", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90791", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10504" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487369", "reference_id": "1487369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487369" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113", "reference_id": "874113", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/835", "reference_id": "CVE-2016-10504", "reference_type": "exploit", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/835" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt", "reference_id": "CVE-2016-10504", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-10504" ], "risk_score": 9.4, "exploitability": "2.0", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wc6r-1t2c-9qdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80759?format=api", "vulnerability_id": "VCID-whsh-5urk-b3ap", "summary": "openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14086", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13988", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762", "reference_id": "1905762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762" }, { "reference_url": "https://security.archlinux.org/AVG-1980", "reference_id": "AVG-1980", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1980" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823", "reference_id": "CVE-2020-27823", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27823" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whsh-5urk-b3ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40239?format=api", "vulnerability_id": "VCID-xc4v-2aa6-yfd6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32934", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516", "reference_id": "1907516", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663", "reference_id": "983663", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843", "reference_id": "CVE-2020-27843", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27843" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xc4v-2aa6-yfd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13537?format=api", "vulnerability_id": "VCID-xh3j-ufru-6fby", "summary": "Access of Uninitialized Pointer\nA flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16373", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17976", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17756", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1368" }, { "reference_url": "https://github.com/uclouvain/openjpeg/pull/1369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/pull/1369" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067052", "reference_id": "2067052", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067052" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1122", "reference_id": "CVE-2022-1122", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1122" }, { "reference_url": "https://security.gentoo.org/glsa/202209-04", "reference_id": "GLSA-202209-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7645", "reference_id": "RHSA-2022:7645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8207", "reference_id": "RHSA-2022:8207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8207" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2022-1122" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xh3j-ufru-6fby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82454?format=api", "vulnerability_id": "VCID-xvjg-5z4m-pqdv", "summary": "openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20847", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72548", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72795", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728509", "reference_id": "1728509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728509" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294", "reference_id": "931294", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20847" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xvjg-5z4m-pqdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40224?format=api", "vulnerability_id": "VCID-yb58-a8p7-v7dw", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74846", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74855", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74843", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74822", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755769", "reference_id": "1755769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755769" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553", "reference_id": "939553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-21010", "reference_id": "CVE-2018-21010", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-21010" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-21010" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yb58-a8p7-v7dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93803?format=api", "vulnerability_id": "VCID-z1a1-p95p-sya2", "summary": "An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68265", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68281", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68362", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68369", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68361", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-7648" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a1-p95p-sya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40241?format=api", "vulnerability_id": "VCID-zgaa-57ak-jbex", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523", "reference_id": "1907523", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845", "reference_id": "CVE-2020-27845", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27845" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgaa-57ak-jbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84045?format=api", "vulnerability_id": "VCID-zmh5-86mb-yqde", "summary": "openjpeg: Heap-based buffer overflow in opj_mqc_flush in mqc.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14151", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75834", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.7585", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75835", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487390", "reference_id": "1487390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430", "reference_id": "874430", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14151" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh5-86mb-yqde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83180?format=api", "vulnerability_id": "VCID-zz9f-brcy-ekdy", "summary": "openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61488", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61646", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61787", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61792", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626088", "reference_id": "1626088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626088" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-16375" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz9f-brcy-ekdy" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81622?format=api", "vulnerability_id": "VCID-5x4u-vqvr-bfhw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78593", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.786", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78637", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.7865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.7867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01168", "scoring_system": "epss", "scoring_elements": "0.78667", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381268", "reference_id": "1381268", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381268" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-8332" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5x4u-vqvr-bfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58975?format=api", "vulnerability_id": "VCID-6fte-2hrw-z3eb", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73166", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73171", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73221", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73246", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73265", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372219", "reference_id": "1372219", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372219" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5158" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fte-2hrw-z3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63485?format=api", "vulnerability_id": "VCID-7vw2-fcqu-8bae", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77949", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77967", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.7796", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389", "reference_id": "1487389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431", "reference_id": "874431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14152" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vw2-fcqu-8bae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80952?format=api", "vulnerability_id": "VCID-8ruh-x3eq-rffk", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66148", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00506", "scoring_system": "epss", "scoring_elements": "0.66223", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374329", "reference_id": "1374329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374329" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604", "reference_id": "837604", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-7163" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ruh-x3eq-rffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62380?format=api", "vulnerability_id": "VCID-9ezw-mty9-z3cv", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80211", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80208", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80175", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80179", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770", "reference_id": "1335770", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149", "reference_id": "800149", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2015-8871" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80951?format=api", "vulnerability_id": "VCID-9f84-54j5-abbf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84822", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84903", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.8492", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02349", "scoring_system": "epss", "scoring_elements": "0.84918", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267983", "reference_id": "1267983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267983" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453", "reference_id": "800453", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2015-6581" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9f84-54j5-abbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60056?format=api", "vulnerability_id": "VCID-c6g2-dknk-u3cy", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.7758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77615", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77626", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.7766", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77654", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402711", "reference_id": "1402711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402711" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422", "reference_id": "851422", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-9573" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6g2-dknk-u3cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58966?format=api", "vulnerability_id": "VCID-drgt-8maa-xqgv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76984", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213", "reference_id": "1372213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-5152" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drgt-8maa-xqgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=api", "vulnerability_id": "VCID-e76r-pz11-yfhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7053", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571480" }, { "reference_url": "https://codereview.chromium.org/1583233008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1583233008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156", "reference_id": "1306156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626", "reference_id": "CVE-2016-1626", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1626" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60060?format=api", "vulnerability_id": "VCID-fq9r-fneu-1fhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71574", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768", "reference_id": "1487768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118", "reference_id": "874118", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14039" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9r-fneu-1fhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60054?format=api", "vulnerability_id": "VCID-jayn-yzet-k7g5", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.679", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.6789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67913", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231", "reference_id": "1390231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557", "reference_id": "844557", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557" }, { "reference_url": "https://security.archlinux.org/AVG-54", "reference_id": "AVG-54", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-54" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-9118" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jayn-yzet-k7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60055?format=api", "vulnerability_id": "VCID-jpxx-3mbf-pyhe", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01771", "scoring_system": "epss", "scoring_elements": "0.82692", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402714", "reference_id": "1402714", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402714" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422", "reference_id": "851422", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-9572" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jpxx-3mbf-pyhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=api", "vulnerability_id": "VCID-jqup-3gmb-mqbh", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75715", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571479" }, { "reference_url": "https://codereview.chromium.org/1590593002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1590593002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.debian.org/security/2017/dsa-4013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-4013" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577", "reference_id": "1310577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628", "reference_id": "CVE-2016-1628", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1628" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63484?format=api", "vulnerability_id": "VCID-jvtx-fv51-5bbe", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75804", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.7923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79787", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347", "reference_id": "1487347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115", "reference_id": "874115", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14041" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtx-fv51-5bbe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62382?format=api", "vulnerability_id": "VCID-jwrz-ypan-9bg6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76037", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7601", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3665", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3665" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772", "reference_id": "1299772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924", "reference_id": "CVE-2016-1924", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-1924" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58977?format=api", "vulnerability_id": "VCID-ubrj-hty6-c3cc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80903", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.8092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01465", "scoring_system": "epss", "scoring_elements": "0.80921", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372220", "reference_id": "1372220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372220" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0559", "reference_id": "RHSA-2017:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0838", "reference_id": "RHSA-2017:0838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" } ], "aliases": [ "CVE-2016-5159" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubrj-hty6-c3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63483?format=api", "vulnerability_id": "VCID-uzpe-dvyu-ckfc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.7534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76049", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361", "reference_id": "1487361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117", "reference_id": "874117", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14040" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzpe-dvyu-ckfc" } ], "risk_score": "9.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }