Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
Typedeb
Namespacedebian
Nameopenjpeg2
Version2.1.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.1.2-1
Latest_non_vulnerable_version2.5.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-454c-fk3j-g7aa
vulnerability_id VCID-454c-fk3j-g7aa
summary openjpeg: Heap buffer overflow in function color_cmyk_to_rgb in color.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4796
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48908
published_at 2026-04-01T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48945
published_at 2026-04-02T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48971
published_at 2026-04-04T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48925
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48979
published_at 2026-04-08T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48976
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48993
published_at 2026-04-11T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48967
published_at 2026-04-12T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48974
published_at 2026-04-13T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.4902
published_at 2026-04-16T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.49017
published_at 2026-04-18T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.48978
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335482
reference_id 1335482
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335482
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-4796
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-454c-fk3j-g7aa
1
url VCID-4qgw-3tgj-4kas
vulnerability_id VCID-4qgw-3tgj-4kas
summary Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1239
reference_id
reference_type
scores
0
value 0.00828
scoring_system epss
scoring_elements 0.74553
published_at 2026-04-18T12:55:00Z
1
value 0.00828
scoring_system epss
scoring_elements 0.74516
published_at 2026-04-12T12:55:00Z
2
value 0.00828
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-13T12:55:00Z
3
value 0.00828
scoring_system epss
scoring_elements 0.74545
published_at 2026-04-21T12:55:00Z
4
value 0.00828
scoring_system epss
scoring_elements 0.74462
published_at 2026-04-01T12:55:00Z
5
value 0.00828
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-07T12:55:00Z
6
value 0.00828
scoring_system epss
scoring_elements 0.74492
published_at 2026-04-04T12:55:00Z
7
value 0.00828
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-08T12:55:00Z
8
value 0.00828
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-09T12:55:00Z
9
value 0.00828
scoring_system epss
scoring_elements 0.74535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1239
1
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=430891
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=430891
2
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=457493
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=457493
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1239
reference_id CVE-2015-1239
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-1239
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2015-1239
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qgw-3tgj-4kas
2
url VCID-9ezw-mty9-z3cv
vulnerability_id VCID-9ezw-mty9-z3cv
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8871
reference_id
reference_type
scores
0
value 0.01364
scoring_system epss
scoring_elements 0.80211
published_at 2026-04-21T12:55:00Z
1
value 0.01364
scoring_system epss
scoring_elements 0.80208
published_at 2026-04-18T12:55:00Z
2
value 0.01364
scoring_system epss
scoring_elements 0.80131
published_at 2026-04-01T12:55:00Z
3
value 0.01364
scoring_system epss
scoring_elements 0.80138
published_at 2026-04-02T12:55:00Z
4
value 0.01364
scoring_system epss
scoring_elements 0.80158
published_at 2026-04-04T12:55:00Z
5
value 0.01364
scoring_system epss
scoring_elements 0.80146
published_at 2026-04-07T12:55:00Z
6
value 0.01364
scoring_system epss
scoring_elements 0.80175
published_at 2026-04-08T12:55:00Z
7
value 0.01364
scoring_system epss
scoring_elements 0.80183
published_at 2026-04-09T12:55:00Z
8
value 0.01364
scoring_system epss
scoring_elements 0.80202
published_at 2026-04-11T12:55:00Z
9
value 0.01364
scoring_system epss
scoring_elements 0.80187
published_at 2026-04-12T12:55:00Z
10
value 0.01364
scoring_system epss
scoring_elements 0.80179
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335770
reference_id 1335770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335770
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149
reference_id 800149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149
9
reference_url https://security.gentoo.org/glsa/201612-26
reference_id GLSA-201612-26
reference_type
scores
url https://security.gentoo.org/glsa/201612-26
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2015-8871
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv
3
url VCID-9f84-54j5-abbf
vulnerability_id VCID-9f84-54j5-abbf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6581
reference_id
reference_type
scores
0
value 0.02349
scoring_system epss
scoring_elements 0.84822
published_at 2026-04-01T12:55:00Z
1
value 0.02349
scoring_system epss
scoring_elements 0.84837
published_at 2026-04-02T12:55:00Z
2
value 0.02349
scoring_system epss
scoring_elements 0.84855
published_at 2026-04-04T12:55:00Z
3
value 0.02349
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-07T12:55:00Z
4
value 0.02349
scoring_system epss
scoring_elements 0.84879
published_at 2026-04-08T12:55:00Z
5
value 0.02349
scoring_system epss
scoring_elements 0.84886
published_at 2026-04-09T12:55:00Z
6
value 0.02349
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-11T12:55:00Z
7
value 0.02349
scoring_system epss
scoring_elements 0.84903
published_at 2026-04-12T12:55:00Z
8
value 0.02349
scoring_system epss
scoring_elements 0.84898
published_at 2026-04-13T12:55:00Z
9
value 0.02349
scoring_system epss
scoring_elements 0.84919
published_at 2026-04-16T12:55:00Z
10
value 0.02349
scoring_system epss
scoring_elements 0.8492
published_at 2026-04-18T12:55:00Z
11
value 0.02349
scoring_system epss
scoring_elements 0.84918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1267983
reference_id 1267983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1267983
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453
reference_id 800453
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2015-6581
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f84-54j5-abbf
4
url VCID-9sk8-qkrw-5bdj
vulnerability_id VCID-9sk8-qkrw-5bdj
summary openjpeg: Division-by-zero in function opj_tcd_init_tile in tcd.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4797
reference_id
reference_type
scores
0
value 0.00285
scoring_system epss
scoring_elements 0.51914
published_at 2026-04-21T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51933
published_at 2026-04-18T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.51774
published_at 2026-04-01T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-02T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.5185
published_at 2026-04-04T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.51812
published_at 2026-04-07T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.51867
published_at 2026-04-08T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.51865
published_at 2026-04-09T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.51917
published_at 2026-04-11T12:55:00Z
9
value 0.00285
scoring_system epss
scoring_elements 0.519
published_at 2026-04-12T12:55:00Z
10
value 0.00285
scoring_system epss
scoring_elements 0.51884
published_at 2026-04-13T12:55:00Z
11
value 0.00285
scoring_system epss
scoring_elements 0.51927
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335483
reference_id 1335483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335483
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-4797
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sk8-qkrw-5bdj
5
url VCID-dvse-ce3w-p7da
vulnerability_id VCID-dvse-ce3w-p7da
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1923
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64581
published_at 2026-04-21T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-16T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-18T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64469
published_at 2026-04-01T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-02T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64552
published_at 2026-04-04T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.6451
published_at 2026-04-07T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64558
published_at 2026-04-08T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64575
published_at 2026-04-09T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64591
published_at 2026-04-11T12:55:00Z
10
value 0.0047
scoring_system epss
scoring_elements 0.64578
published_at 2026-04-12T12:55:00Z
11
value 0.0047
scoring_system epss
scoring_elements 0.6455
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
5
reference_url http://www.openwall.com/lists/oss-security/2016/01/18/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/18/4
6
reference_url http://www.openwall.com/lists/oss-security/2016/01/18/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/18/7
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299767
reference_id 1299767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299767
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
reference_id 818399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1923
reference_id CVE-2016-1923
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1923
11
reference_url https://security.gentoo.org/glsa/201612-26
reference_id GLSA-201612-26
reference_type
scores
url https://security.gentoo.org/glsa/201612-26
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-1923
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvse-ce3w-p7da
6
url VCID-jwrz-ypan-9bg6
vulnerability_id VCID-jwrz-ypan-9bg6
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1924
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-21T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.7605
published_at 2026-04-16T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.76053
published_at 2026-04-18T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.75952
published_at 2026-04-01T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-02T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.75987
published_at 2026-04-04T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.75966
published_at 2026-04-07T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.75999
published_at 2026-04-08T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.76014
published_at 2026-04-09T12:55:00Z
9
value 0.00925
scoring_system epss
scoring_elements 0.76039
published_at 2026-04-11T12:55:00Z
10
value 0.00925
scoring_system epss
scoring_elements 0.76015
published_at 2026-04-12T12:55:00Z
11
value 0.00925
scoring_system epss
scoring_elements 0.7601
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
8
reference_url http://www.debian.org/security/2016/dsa-3665
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3665
9
reference_url http://www.openwall.com/lists/oss-security/2016/01/18/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/18/4
10
reference_url http://www.openwall.com/lists/oss-security/2016/01/18/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/18/7
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1299772
reference_id 1299772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1299772
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
reference_id 818399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1924
reference_id CVE-2016-1924
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1924
15
reference_url https://security.gentoo.org/glsa/201612-26
reference_id GLSA-201612-26
reference_type
scores
url https://security.gentoo.org/glsa/201612-26
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-1924
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6
7
url VCID-t76s-q45b-9ff7
vulnerability_id VCID-t76s-q45b-9ff7
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3183
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21324
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21491
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21548
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21304
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21382
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21443
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21454
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21416
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2136
published_at 2026-04-13T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21357
published_at 2026-04-16T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21364
published_at 2026-04-18T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21332
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1317821
reference_id 1317821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1317821
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
reference_id 818399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399
5
reference_url https://security.gentoo.org/glsa/201612-26
reference_id GLSA-201612-26
reference_type
scores
url https://security.gentoo.org/glsa/201612-26
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-3183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t76s-q45b-9ff7
8
url VCID-txsw-c8hq-suaj
vulnerability_id VCID-txsw-c8hq-suaj
summary
Multiple vulnerabilities have been found in Chromium, the worst of
    which can allow remote attackers to cause Denial of Service or gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7947
reference_id
reference_type
scores
0
value 0.01436
scoring_system epss
scoring_elements 0.80733
published_at 2026-04-21T12:55:00Z
1
value 0.01675
scoring_system epss
scoring_elements 0.82093
published_at 2026-04-02T12:55:00Z
2
value 0.01675
scoring_system epss
scoring_elements 0.82113
published_at 2026-04-04T12:55:00Z
3
value 0.01675
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-07T12:55:00Z
4
value 0.01675
scoring_system epss
scoring_elements 0.82136
published_at 2026-04-08T12:55:00Z
5
value 0.01675
scoring_system epss
scoring_elements 0.8208
published_at 2026-04-01T12:55:00Z
6
value 0.01675
scoring_system epss
scoring_elements 0.82163
published_at 2026-04-11T12:55:00Z
7
value 0.01675
scoring_system epss
scoring_elements 0.82154
published_at 2026-04-12T12:55:00Z
8
value 0.01675
scoring_system epss
scoring_elements 0.82148
published_at 2026-04-13T12:55:00Z
9
value 0.01675
scoring_system epss
scoring_elements 0.82186
published_at 2026-04-18T12:55:00Z
10
value 0.01675
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1185229
reference_id 1185229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1185229
4
reference_url https://security.gentoo.org/glsa/201502-13
reference_id GLSA-201502-13
reference_type
scores
url https://security.gentoo.org/glsa/201502-13
5
reference_url https://access.redhat.com/errata/RHSA-2015:0093
reference_id RHSA-2015:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0093
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2014-7947
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txsw-c8hq-suaj
9
url VCID-vxw5-nm1p-q3d5
vulnerability_id VCID-vxw5-nm1p-q3d5
summary
Multiple vulnerabilities have been found in OpenJPEG, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3182
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54338
published_at 2026-04-01T12:55:00Z
1
value 0.00313
scoring_system epss
scoring_elements 0.5436
published_at 2026-04-02T12:55:00Z
2
value 0.00313
scoring_system epss
scoring_elements 0.54388
published_at 2026-04-04T12:55:00Z
3
value 0.00313
scoring_system epss
scoring_elements 0.54364
published_at 2026-04-07T12:55:00Z
4
value 0.00313
scoring_system epss
scoring_elements 0.54416
published_at 2026-04-08T12:55:00Z
5
value 0.00313
scoring_system epss
scoring_elements 0.54411
published_at 2026-04-09T12:55:00Z
6
value 0.00313
scoring_system epss
scoring_elements 0.5446
published_at 2026-04-16T12:55:00Z
7
value 0.00313
scoring_system epss
scoring_elements 0.54443
published_at 2026-04-12T12:55:00Z
8
value 0.00313
scoring_system epss
scoring_elements 0.54421
published_at 2026-04-13T12:55:00Z
9
value 0.00313
scoring_system epss
scoring_elements 0.54464
published_at 2026-04-18T12:55:00Z
10
value 0.00313
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1317826
reference_id 1317826
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1317826
4
reference_url https://security.gentoo.org/glsa/201612-26
reference_id GLSA-201612-26
reference_type
scores
url https://security.gentoo.org/glsa/201612-26
fixed_packages
0
url pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
purl pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie
2
url pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
purl pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie
aliases CVE-2016-3182
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxw5-nm1p-q3d5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie