Lookup for vulnerable packages by Package URL.

Purlpkg:conan/libtiff@4.5.0
Typeconan
Namespace
Namelibtiff
Version4.5.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.7.0
Latest_non_vulnerable_version4.7.0
Affected_by_vulnerabilities
0
url VCID-4mhv-7vrm-v7hv
vulnerability_id VCID-4mhv-7vrm-v7hv
summary
Out-of-bounds Read
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1916.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1916
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03562
published_at 2026-04-21T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03453
published_at 2026-04-13T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03427
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03439
published_at 2026-04-18T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03529
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.0353
published_at 2026-04-08T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03552
published_at 2026-04-09T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03508
published_at 2026-04-11T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03478
published_at 2026-04-12T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-02T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04356
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1916
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/libtiff/libtiff/-/issues/536
reference_id
reference_type
scores
url https://gitlab.com/libtiff/libtiff/-/issues/536
5
reference_url https://gitlab.com/libtiff/libtiff/-/issues/536,
reference_id
reference_type
scores
url https://gitlab.com/libtiff/libtiff/-/issues/536,
6
reference_url https://gitlab.com/libtiff/libtiff/-/issues/537
reference_id
reference_type
scores
url https://gitlab.com/libtiff/libtiff/-/issues/537
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185074
reference_id 2185074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185074
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-1916
reference_id CVE-2023-1916
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-1916
9
reference_url https://usn.ubuntu.com/6428-1/
reference_id USN-6428-1
reference_type
scores
url https://usn.ubuntu.com/6428-1/
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-1916
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mhv-7vrm-v7hv
1
url VCID-6dt6-ppka-b3ct
vulnerability_id VCID-6dt6-ppka-b3ct
summary
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26966.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26966
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07323
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07297
published_at 2026-04-11T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07283
published_at 2026-04-12T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07273
published_at 2026-04-13T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07203
published_at 2026-04-16T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07198
published_at 2026-04-18T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07241
published_at 2026-04-04T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.0722
published_at 2026-04-07T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07274
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07301
published_at 2026-04-09T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08031
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/libtiff/libtiff/-/issues/530
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/
url https://gitlab.com/libtiff/libtiff/-/issues/530
5
reference_url https://gitlab.com/libtiff/libtiff/-/merge_requests/473
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/
url https://gitlab.com/libtiff/libtiff/-/merge_requests/473
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218749
reference_id 2218749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218749
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26966
reference_id CVE-2023-26966
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-26966
8
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:6575
reference_id RHSA-2023:6575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6575
10
reference_url https://usn.ubuntu.com/6229-1/
reference_id USN-6229-1
reference_type
scores
url https://usn.ubuntu.com/6229-1/
11
reference_url https://usn.ubuntu.com/6290-1/
reference_id USN-6290-1
reference_type
scores
url https://usn.ubuntu.com/6290-1/
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-26966
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dt6-ppka-b3ct
2
url VCID-cwen-8yyj-x3aw
vulnerability_id VCID-cwen-8yyj-x3aw
summary
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25434.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25434
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43294
published_at 2026-04-02T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43326
published_at 2026-04-09T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43323
published_at 2026-04-04T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.4326
published_at 2026-04-07T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43312
published_at 2026-04-08T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.4661
published_at 2026-04-18T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46613
published_at 2026-04-16T12:55:00Z
7
value 0.00236
scoring_system epss
scoring_elements 0.46557
published_at 2026-04-21T12:55:00Z
8
value 0.00236
scoring_system epss
scoring_elements 0.46575
published_at 2026-04-11T12:55:00Z
9
value 0.00236
scoring_system epss
scoring_elements 0.46547
published_at 2026-04-12T12:55:00Z
10
value 0.00236
scoring_system epss
scoring_elements 0.46556
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25434
3
reference_url https://gitlab.com/libtiff/libtiff/-/issues/519
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:18:44Z/
url https://gitlab.com/libtiff/libtiff/-/issues/519
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215209
reference_id 2215209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215209
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25434
reference_id CVE-2023-25434
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-25434
fixed_packages
aliases CVE-2023-25434
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwen-8yyj-x3aw
3
url VCID-ju1t-bhyh-v7du
vulnerability_id VCID-ju1t-bhyh-v7du
summary
Out-of-bounds Write
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48281.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48281
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01153
published_at 2026-04-21T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01091
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01093
published_at 2026-04-04T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01099
published_at 2026-04-07T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01104
published_at 2026-04-08T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01105
published_at 2026-04-09T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01089
published_at 2026-04-11T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01082
published_at 2026-04-12T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01084
published_at 2026-04-13T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01077
published_at 2026-04-16T12:55:00Z
10
value 0.0001
scoring_system epss
scoring_elements 0.01087
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1623
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2519
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2520
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2521
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2953
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34526
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3570
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3597
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3598
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3599
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3626
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4645
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
28
reference_url https://gitlab.com/libtiff/libtiff/-/issues/488
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://gitlab.com/libtiff/libtiff/-/issues/488
29
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
30
reference_url https://www.debian.org/security/2023/dsa-5333
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://www.debian.org/security/2023/dsa-5333
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029653
reference_id 1029653
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029653
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2163606
reference_id 2163606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2163606
33
reference_url https://security.archlinux.org/AVG-2842
reference_id AVG-2842
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2842
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-48281
reference_id CVE-2022-48281
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-48281
35
reference_url https://security.gentoo.org/glsa/202305-31
reference_id GLSA-202305-31
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://security.gentoo.org/glsa/202305-31
36
reference_url https://security.netapp.com/advisory/ntap-20230302-0004/
reference_id ntap-20230302-0004
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:03:44Z/
url https://security.netapp.com/advisory/ntap-20230302-0004/
37
reference_url https://access.redhat.com/errata/RHSA-2023:3711
reference_id RHSA-2023:3711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3711
38
reference_url https://access.redhat.com/errata/RHSA-2023:3827
reference_id RHSA-2023:3827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3827
39
reference_url https://usn.ubuntu.com/5841-1/
reference_id USN-5841-1
reference_type
scores
url https://usn.ubuntu.com/5841-1/
40
reference_url https://usn.ubuntu.com/6290-1/
reference_id USN-6290-1
reference_type
scores
url https://usn.ubuntu.com/6290-1/
fixed_packages
aliases CVE-2022-48281
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ju1t-bhyh-v7du
4
url VCID-k8kt-55y9-qyac
vulnerability_id VCID-k8kt-55y9-qyac
summary
NULL Pointer Dereference
A null pointer dereference issue was discovered in Libtiff's tif_dir.c file. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcp utility, which triggers runtime error, causing an undefined behavior, resulting in an application crash, eventually leading to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2908.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2908.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2908
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0239
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02312
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02318
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02314
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02317
published_at 2026-04-08T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02339
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02321
published_at 2026-04-11T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02307
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02305
published_at 2026-04-13T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02289
published_at 2026-04-16T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02294
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2908
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218830
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218830
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
6
reference_url https://gitlab.com/libtiff/libtiff/-/merge_requests/479
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://gitlab.com/libtiff/libtiff/-/merge_requests/479
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2023-2908
reference_id CVE-2023-2908
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://access.redhat.com/security/cve/CVE-2023-2908
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2908
reference_id CVE-2023-2908
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-2908
13
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
14
reference_url https://security.netapp.com/advisory/ntap-20230731-0004/
reference_id ntap-20230731-0004
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/
url https://security.netapp.com/advisory/ntap-20230731-0004/
15
reference_url https://usn.ubuntu.com/6290-1/
reference_id USN-6290-1
reference_type
scores
url https://usn.ubuntu.com/6290-1/
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-2908
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kt-55y9-qyac
5
url VCID-ndwc-beev-43ck
vulnerability_id VCID-ndwc-beev-43ck
summary
Out-of-bounds Write
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26965.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26965
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00733
published_at 2026-04-02T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-07T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-08T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00726
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00844
published_at 2026-04-21T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00796
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00801
published_at 2026-04-11T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00795
published_at 2026-04-16T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.008
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/libtiff/libtiff/-/merge_requests/472
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/
url https://gitlab.com/libtiff/libtiff/-/merge_requests/472
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215206
reference_id 2215206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215206
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26965
reference_id CVE-2023-26965
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-26965
7
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
8
reference_url https://security.netapp.com/advisory/ntap-20230706-0009/
reference_id ntap-20230706-0009
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/
url https://security.netapp.com/advisory/ntap-20230706-0009/
9
reference_url https://access.redhat.com/errata/RHSA-2023:6575
reference_id RHSA-2023:6575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6575
10
reference_url https://usn.ubuntu.com/6229-1/
reference_id USN-6229-1
reference_type
scores
url https://usn.ubuntu.com/6229-1/
11
reference_url https://usn.ubuntu.com/6290-1/
reference_id USN-6290-1
reference_type
scores
url https://usn.ubuntu.com/6290-1/
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-26965
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndwc-beev-43ck
6
url VCID-xmwn-vxux-h7g3
vulnerability_id VCID-xmwn-vxux-h7g3
summary
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25435.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25435
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09455
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09491
published_at 2026-04-08T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09504
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09417
published_at 2026-04-07T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14206
published_at 2026-04-12T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.1415
published_at 2026-04-13T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.1404
published_at 2026-04-16T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14299
published_at 2026-04-09T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14245
published_at 2026-04-11T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-18T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16323
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25435
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/libtiff/libtiff/-/issues/518
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-06T19:11:03Z/
url https://gitlab.com/libtiff/libtiff/-/issues/518
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2216614
reference_id 2216614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2216614
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25435
reference_id CVE-2023-25435
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-25435
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-25435
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xmwn-vxux-h7g3
7
url VCID-z1vf-mhw2-ducs
vulnerability_id VCID-z1vf-mhw2-ducs
summary
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25433.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25433
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07202
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07278
published_at 2026-04-13T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07209
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07204
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07247
published_at 2026-04-04T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07226
published_at 2026-04-07T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.0728
published_at 2026-04-08T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07307
published_at 2026-04-09T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07302
published_at 2026-04-11T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07289
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
3
reference_url https://gitlab.com/libtiff/libtiff/-/issues/520
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/
url https://gitlab.com/libtiff/libtiff/-/issues/520
4
reference_url https://gitlab.com/libtiff/libtiff/-/merge_requests/467
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/
url https://gitlab.com/libtiff/libtiff/-/merge_requests/467
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218744
reference_id 2218744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218744
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25433
reference_id CVE-2023-25433
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-25433
7
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
8
reference_url https://access.redhat.com/errata/RHSA-2024:5079
reference_id RHSA-2024:5079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5079
9
reference_url https://usn.ubuntu.com/6229-1/
reference_id USN-6229-1
reference_type
scores
url https://usn.ubuntu.com/6229-1/
10
reference_url https://usn.ubuntu.com/6290-1/
reference_id USN-6290-1
reference_type
scores
url https://usn.ubuntu.com/6290-1/
fixed_packages
0
url pkg:conan/libtiff@4.5.1
purl pkg:conan/libtiff@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.1
aliases CVE-2023-25433
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1vf-mhw2-ducs
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:conan/libtiff@4.5.0