Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libjpeg-turbo@0?distro=trixie
Typedeb
Namespacedebian
Namelibjpeg-turbo
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.3.0-3
Latest_non_vulnerable_version1:3.1.3-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9ewc-ttxk-eufx
vulnerability_id VCID-9ewc-ttxk-eufx
summary
Out-of-bounds Write
libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29390.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29390
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20348
published_at 2026-04-13T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20493
published_at 2026-04-02T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2021
published_at 2026-04-24T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20419
published_at 2026-04-09T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20449
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20404
published_at 2026-04-12T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20338
published_at 2026-04-16T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.2034
published_at 2026-04-18T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20336
published_at 2026-04-21T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20552
published_at 2026-04-04T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.2028
published_at 2026-04-07T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20361
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29390
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1943797
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1943797
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235521
reference_id 2235521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235521
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
reference_id 6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-29390
reference_id CVE-2021-29390
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-29390
7
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c
reference_id jdcoefct.c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c
8
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595
reference_id jdcoefct.c#L595
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
10
reference_url https://access.redhat.com/errata/RHSA-2024:2295
reference_id RHSA-2024:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2295
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2021-29390
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ewc-ttxk-eufx
1
url VCID-b91f-d2h1-8ya5
vulnerability_id VCID-b91f-d2h1-8ya5
summary
Out-of-bounds Write
A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2804.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2804
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23523
published_at 2026-04-24T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.2384
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-07T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-08T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23733
published_at 2026-04-09T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-11T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23706
published_at 2026-04-12T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-13T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23662
published_at 2026-04-16T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23653
published_at 2026-04-18T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23634
published_at 2026-04-21T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2804
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2208447
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T15:15:55Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2208447
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T15:15:55Z/
url https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021
5
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T15:15:55Z/
url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118
6
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T15:15:55Z/
url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675
7
reference_url https://access.redhat.com/security/cve/CVE-2023-2804
reference_id CVE-2023-2804
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T15:15:55Z/
url https://access.redhat.com/security/cve/CVE-2023-2804
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2804
reference_id CVE-2023-2804
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-2804
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2023-2804
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b91f-d2h1-8ya5
2
url VCID-bz3a-w43e-y7fb
vulnerability_id VCID-bz3a-w43e-y7fb
summary libjpeg-turbo: DoS via open crafted GIF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20205.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20205
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63034
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63093
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63087
published_at 2026-04-07T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63139
published_at 2026-04-08T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63156
published_at 2026-04-09T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63174
published_at 2026-04-11T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63159
published_at 2026-04-21T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63136
published_at 2026-04-13T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63171
published_at 2026-04-16T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63178
published_at 2026-04-18T12:55:00Z
11
value 0.00439
scoring_system epss
scoring_elements 0.6318
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20205
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1937385
reference_id 1937385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1937385
3
reference_url https://security.archlinux.org/AVG-1671
reference_id AVG-1671
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1671
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-20205
reference_id CVE-2021-20205
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-20205
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2021-20205
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz3a-w43e-y7fb
3
url VCID-ed2r-h2fk-kqfq
vulnerability_id VCID-ed2r-h2fk-kqfq
summary
A vulnerability in libjpeg-turbo could result in execution of
    arbitrary code or Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2806
reference_id
reference_type
scores
0
value 0.02359
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-01T12:55:00Z
1
value 0.02359
scoring_system epss
scoring_elements 0.84862
published_at 2026-04-02T12:55:00Z
2
value 0.02359
scoring_system epss
scoring_elements 0.8488
published_at 2026-04-04T12:55:00Z
3
value 0.02359
scoring_system epss
scoring_elements 0.84882
published_at 2026-04-07T12:55:00Z
4
value 0.02359
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-08T12:55:00Z
5
value 0.02359
scoring_system epss
scoring_elements 0.84913
published_at 2026-04-09T12:55:00Z
6
value 0.02359
scoring_system epss
scoring_elements 0.8493
published_at 2026-04-11T12:55:00Z
7
value 0.02359
scoring_system epss
scoring_elements 0.84929
published_at 2026-04-12T12:55:00Z
8
value 0.02359
scoring_system epss
scoring_elements 0.84924
published_at 2026-04-13T12:55:00Z
9
value 0.02359
scoring_system epss
scoring_elements 0.84945
published_at 2026-04-16T12:55:00Z
10
value 0.02359
scoring_system epss
scoring_elements 0.84946
published_at 2026-04-18T12:55:00Z
11
value 0.02359
scoring_system epss
scoring_elements 0.84943
published_at 2026-04-21T12:55:00Z
12
value 0.02359
scoring_system epss
scoring_elements 0.84968
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2806
1
reference_url http://www.openwall.com/lists/oss-security/2012/07/17/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://www.openwall.com/lists/oss-security/2012/07/17/3
2
reference_url http://secunia.com/advisories/49883
reference_id 49883
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://secunia.com/advisories/49883
3
reference_url http://secunia.com/advisories/50753
reference_id 50753
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://secunia.com/advisories/50753
4
reference_url http://www.securityfocus.com/bid/54480
reference_id 54480
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://www.securityfocus.com/bid/54480
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/76952
reference_id 76952
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/76952
6
reference_url http://osvdb.org/84040
reference_id 84040
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://osvdb.org/84040
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:121
reference_id advisories?name=MDVSA-2012:121
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:121
8
reference_url https://security.gentoo.org/glsa/201209-13
reference_id GLSA-201209-13
reference_type
scores
url https://security.gentoo.org/glsa/201209-13
9
reference_url http://security.gentoo.org/glsa/glsa-201209-13.xml
reference_id glsa-201209-13.xml
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://security.gentoo.org/glsa/glsa-201209-13.xml
10
reference_url http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830
reference_id libjpeg-turbo?view=revision&revision=830
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=759802
reference_id show_bug.cgi?id=759802
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=759802
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=826849
reference_id show_bug.cgi?id=826849
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-21T19:56:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=826849
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2012-2806
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2r-h2fk-kqfq
4
url VCID-qbwh-xe67-rkdu
vulnerability_id VCID-qbwh-xe67-rkdu
summary libjpeg-turbo: heap-based buffer overflow in tjLoadImage
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20330.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20330
reference_id
reference_type
scores
0
value 0.00334
scoring_system epss
scoring_elements 0.56074
published_at 2026-04-01T12:55:00Z
1
value 0.00334
scoring_system epss
scoring_elements 0.56137
published_at 2026-04-24T12:55:00Z
2
value 0.00334
scoring_system epss
scoring_elements 0.56244
published_at 2026-04-18T12:55:00Z
3
value 0.00334
scoring_system epss
scoring_elements 0.56212
published_at 2026-04-21T12:55:00Z
4
value 0.00334
scoring_system epss
scoring_elements 0.56184
published_at 2026-04-07T12:55:00Z
5
value 0.00334
scoring_system epss
scoring_elements 0.56204
published_at 2026-04-04T12:55:00Z
6
value 0.00334
scoring_system epss
scoring_elements 0.56235
published_at 2026-04-08T12:55:00Z
7
value 0.00334
scoring_system epss
scoring_elements 0.56241
published_at 2026-04-09T12:55:00Z
8
value 0.00334
scoring_system epss
scoring_elements 0.56251
published_at 2026-04-11T12:55:00Z
9
value 0.00334
scoring_system epss
scoring_elements 0.56227
published_at 2026-04-12T12:55:00Z
10
value 0.00334
scoring_system epss
scoring_elements 0.56209
published_at 2026-04-13T12:55:00Z
11
value 0.00334
scoring_system epss
scoring_elements 0.56242
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20330
2
reference_url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/304
reference_id
reference_type
scores
url https://github.com/libjpeg-turbo/libjpeg-turbo/issues/304
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665223
reference_id 1665223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665223
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20330
reference_id CVE-2018-20330
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20330
6
reference_url https://usn.ubuntu.com/4190-1/
reference_id USN-4190-1
reference_type
scores
url https://usn.ubuntu.com/4190-1/
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2018-20330
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbwh-xe67-rkdu
5
url VCID-uu2t-7ffz-j7bm
vulnerability_id VCID-uu2t-7ffz-j7bm
summary libjpeg-turbo: heap-based buffer over-read in the put_pixel_rows function in wrbmp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19664.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19664
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44504
published_at 2026-04-01T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44579
published_at 2026-04-02T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.446
published_at 2026-04-04T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44537
published_at 2026-04-07T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44588
published_at 2026-04-08T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44593
published_at 2026-04-09T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.4461
published_at 2026-04-11T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.4458
published_at 2026-04-12T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44581
published_at 2026-04-13T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44637
published_at 2026-04-16T12:55:00Z
10
value 0.00219
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-18T12:55:00Z
11
value 0.00219
scoring_system epss
scoring_elements 0.44561
published_at 2026-04-21T12:55:00Z
12
value 0.00219
scoring_system epss
scoring_elements 0.44474
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19664
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1656218
reference_id 1656218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1656218
4
reference_url https://usn.ubuntu.com/4190-1/
reference_id USN-4190-1
reference_type
scores
url https://usn.ubuntu.com/4190-1/
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2018-19664
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uu2t-7ffz-j7bm
6
url VCID-wejg-2zp8-1yd3
vulnerability_id VCID-wejg-2zp8-1yd3
summary libjpeg: out-of-bounds read for certain table pointers in jdhuff.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14153.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14153
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.56997
published_at 2026-04-01T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57091
published_at 2026-04-07T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57114
published_at 2026-04-04T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.57142
published_at 2026-04-08T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57144
published_at 2026-04-09T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57156
published_at 2026-04-11T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57136
published_at 2026-04-12T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57115
published_at 2026-04-13T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57143
published_at 2026-04-16T12:55:00Z
9
value 0.00345
scoring_system epss
scoring_elements 0.57138
published_at 2026-04-18T12:55:00Z
10
value 0.00345
scoring_system epss
scoring_elements 0.57116
published_at 2026-04-21T12:55:00Z
11
value 0.00345
scoring_system epss
scoring_elements 0.57047
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14153
2
reference_url https://bugs.gentoo.org/727908
reference_id
reference_type
scores
url https://bugs.gentoo.org/727908
3
reference_url http://www.ijg.org/files/jpegsrc.v9d.tar.gz
reference_id
reference_type
scores
url http://www.ijg.org/files/jpegsrc.v9d.tar.gz
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849032
reference_id 1849032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849032
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-14153
reference_id CVE-2020-14153
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-14153
6
reference_url https://usn.ubuntu.com/USN-5336-1/
reference_id USN-USN-5336-1
reference_type
scores
url https://usn.ubuntu.com/USN-5336-1/
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2020-14153
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wejg-2zp8-1yd3
7
url VCID-y4q6-9s32-rkej
vulnerability_id VCID-y4q6-9s32-rkej
summary A remote code execution vulnerability in libjpeg in Android 4.x before 4.4.4, 5.0.x before 5.0.2, and 5.1.x before 5.1.1 could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses libjpeg. Android ID: A-30259087.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6702
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62072
published_at 2026-04-01T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62132
published_at 2026-04-07T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62164
published_at 2026-04-04T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62182
published_at 2026-04-08T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.622
published_at 2026-04-09T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62218
published_at 2026-04-11T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.62208
published_at 2026-04-12T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62187
published_at 2026-04-13T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62231
published_at 2026-04-16T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62238
published_at 2026-04-18T12:55:00Z
10
value 0.00424
scoring_system epss
scoring_elements 0.62222
published_at 2026-04-21T12:55:00Z
11
value 0.00424
scoring_system epss
scoring_elements 0.62233
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6702
fixed_packages
0
url pkg:deb/debian/libjpeg-turbo@0?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie
1
url pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d73e-m4f8-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie
2
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie
3
url pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie
4
url pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
purl pkg:deb/debian/libjpeg-turbo@1:3.1.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:3.1.3-4%3Fdistro=trixie
aliases CVE-2016-6702
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4q6-9s32-rkej
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie