Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1038125?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "type": "deb", "namespace": "debian", "name": "openjpeg2", "version": "2.3.0-2+deb10u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.5.4-1.1", "latest_non_vulnerable_version": "2.5.4-1.1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82455?format=api", "vulnerability_id": "VCID-1z5a-aa47-dyft", "summary": "openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20846", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63784", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.64042", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63983", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.64033", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63897", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6391", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63908", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63914", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63926", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63924", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63942", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63989", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63956", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728513", "reference_id": "1728513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728513" }, { "reference_url": "https://security.archlinux.org/AVG-1390", "reference_id": "AVG-1390", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1390" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20846" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5a-aa47-dyft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40226?format=api", "vulnerability_id": "VCID-2272-j2kp-x3du", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12973", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16449", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16321", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16276", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16144", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1626", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16367", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16333", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16366", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1644", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16492", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16434", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16393", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16323", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16917", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16758", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732270", "reference_id": "1732270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732270" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292", "reference_id": "931292", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2019-12973" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2272-j2kp-x3du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80758?format=api", "vulnerability_id": "VCID-2ad2-5t5w-d7ew", "summary": "openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35008", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35403", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35092", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35003", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34882", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34954", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34991", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34894", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34921", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.5088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50934", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723", "reference_id": "1905723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824", "reference_id": "CVE-2020-27824", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27824" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ad2-5t5w-d7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40238?format=api", "vulnerability_id": "VCID-3r1m-53dp-yff2", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29418", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29329", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29457", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29387", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29308", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513", "reference_id": "1907513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842", "reference_id": "CVE-2020-27842", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27842" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1m-53dp-yff2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40236?format=api", "vulnerability_id": "VCID-4hbk-qsje-63fd", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3025", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30141", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30025", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.2995", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3039", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54033", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54154", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53991", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54089", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54047", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54073", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54141", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510", "reference_id": "1907510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841", "reference_id": "CVE-2020-27841", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27841" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4hbk-qsje-63fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81676?format=api", "vulnerability_id": "VCID-7ath-fa35-5uca", "summary": "openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80876", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80829", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80873", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80739", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80757", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80774", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80796", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80816", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80811", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511", "reference_id": "1790511", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000", "reference_id": "950000", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851", "reference_id": "CVE-2020-6851", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0262", "reference_id": "RHSA-2020:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0274", "reference_id": "RHSA-2020:0274", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0296", "reference_id": "RHSA-2020:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0296" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-6851" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ath-fa35-5uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13138?format=api", "vulnerability_id": "VCID-an46-hxt9-57e1", "summary": "Out-of-bounds Write\nA heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55985", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55911", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5597", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55991", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.56057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5596", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55887", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55907", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55884", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5583", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55878", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55936", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55885", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3575" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1347" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775", "reference_id": "989775", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775" }, { "reference_url": "https://security.archlinux.org/AVG-2850", "reference_id": "AVG-2850", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2850" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3575", "reference_id": "CVE-2021-3575", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3575" }, { "reference_url": "https://ubuntu.com/security/CVE-2021-3575", "reference_id": "CVE-2021-3575", "reference_type": "", "scores": [], "url": "https://ubuntu.com/security/CVE-2021-3575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-3575" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-an46-hxt9-57e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72596?format=api", "vulnerability_id": "VCID-cgvq-jt8a-4yba", "summary": "openjpeg: heap buffer overflow in bin/common/color.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09658", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09447", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09357", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09516", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09586", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09567", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.096", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09662", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10539", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10444", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675", "reference_id": "1092675", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1563", "reference_id": "1563", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335172", "reference_id": "2335172", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335172" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-56826", "reference_id": "CVE-2024-56826", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-56826" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8", "reference_id": "e492644fbded4c820ca55b5e50e598d346e850e8", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7309", "reference_id": "RHSA-2025:7309", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7309" }, { "reference_url": "https://usn.ubuntu.com/7223-1/", "reference_id": "USN-7223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7223-1/" }, { "reference_url": "https://usn.ubuntu.com/7623-1/", "reference_id": "USN-7623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7623-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2024-56826" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvq-jt8a-4yba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82453?format=api", "vulnerability_id": "VCID-ecez-3pwt-pudf", "summary": "openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69671", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69752", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69737", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69754", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69805", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69813", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69818", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69792", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69836", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69867", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69837", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69863", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69913", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00609", "scoring_system": "epss", "scoring_elements": "0.69924", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728505", "reference_id": "1728505", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20845" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecez-3pwt-pudf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83735?format=api", "vulnerability_id": "VCID-hxax-t3zc-8kax", "summary": "openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72503", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72561", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72594", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72603", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72645", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72642", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72664", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72688", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72652", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72677", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7273", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72739", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536552", "reference_id": "1536552", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536552" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532", "reference_id": "888532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-5727" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxax-t3zc-8kax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72597?format=api", "vulnerability_id": "VCID-k9dc-cxnp-nug2", "summary": "openjpeg: heap buffer overflow in lib/openjp2/j2k.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.106", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10428", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10418", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10361", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10304", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10451", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10518", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10497", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10539", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10596", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11552", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11671", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11544", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676", "reference_id": "1092676", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1564", "reference_id": "1564", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1564" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335174", "reference_id": "2335174", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2335174" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-56827", "reference_id": "CVE-2024-56827", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-56827" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8", "reference_id": "e492644fbded4c820ca55b5e50e598d346e850e8", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7309", "reference_id": "RHSA-2025:7309", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7309" }, { "reference_url": "https://usn.ubuntu.com/7223-1/", "reference_id": "USN-7223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7223-1/" }, { "reference_url": "https://usn.ubuntu.com/7623-1/", "reference_id": "USN-7623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7623-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2024-56827" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9dc-cxnp-nug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40229?format=api", "vulnerability_id": "VCID-kq91-13ek-rkcu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57063", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56986", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57048", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5695", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56968", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56948", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57009", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56961", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869", "reference_id": "1852869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220", "reference_id": "965220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389", "reference_id": "CVE-2020-15389", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-15389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kq91-13ek-rkcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81602?format=api", "vulnerability_id": "VCID-mdhg-k4sr-3bg7", "summary": "openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82953", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82908", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82945", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8276", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82828", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82834", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82854", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82895", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82893", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535", "reference_id": "1800535", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184", "reference_id": "950184", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112", "reference_id": "CVE-2020-8112", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0550", "reference_id": "RHSA-2020:0550", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0550" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0569", "reference_id": "RHSA-2020:0569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0570", "reference_id": "RHSA-2020:0570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0570" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-8112" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdhg-k4sr-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34492?format=api", "vulnerability_id": "VCID-pzv2-p44c-8qg4", "summary": "Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25973", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25854", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25947", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26144", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26092", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26035", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25974", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2597", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25813", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25871", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25927", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950101", "reference_id": "1950101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950101" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276", "reference_id": "987276", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276" }, { "reference_url": "https://security.archlinux.org/AVG-1390", "reference_id": "AVG-1390", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1390" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29338", "reference_id": "CVE-2021-29338", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29338" }, { "reference_url": "https://security.gentoo.org/glsa/202209-04", "reference_id": "GLSA-202209-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-29338" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzv2-p44c-8qg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68426?format=api", "vulnerability_id": "VCID-qyq1-1npp-yyb4", "summary": "openjpeg: Openjpeg NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13898", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15011", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15173", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21413", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21399", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22988", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23071", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23147", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23126", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23204", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23225", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23109", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1505", "reference_id": "1505", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T20:28:33Z/" } ], "url": "https://github.com/uclouvain/openjpeg/issues/1505" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387082", "reference_id": "2387082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387082" }, { "reference_url": "https://usn.ubuntu.com/7757-1/", "reference_id": "USN-7757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7757-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2025-50952" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyq1-1npp-yyb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40231?format=api", "vulnerability_id": "VCID-u497-trj1-rfdj", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43752", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4362", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43624", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43541", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43674", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44722", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.448", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44652", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44737", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44678", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44707", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.4478", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998", "reference_id": "1901998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814", "reference_id": "CVE-2020-27814", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27814" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u497-trj1-rfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80759?format=api", "vulnerability_id": "VCID-whsh-5urk-b3ap", "summary": "openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13963", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14086", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1618", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16372", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16065", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16288", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16258", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16291", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16365", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762", "reference_id": "1905762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762" }, { "reference_url": "https://security.archlinux.org/AVG-1980", "reference_id": "AVG-1980", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1980" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823", "reference_id": "CVE-2020-27823", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27823" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whsh-5urk-b3ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40239?format=api", "vulnerability_id": "VCID-xc4v-2aa6-yfd6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32515", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32432", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32498", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3277", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32657", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32573", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32497", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32507", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3241", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516", "reference_id": "1907516", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663", "reference_id": "983663", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843", "reference_id": "CVE-2020-27843", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27843" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xc4v-2aa6-yfd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13537?format=api", "vulnerability_id": "VCID-xh3j-ufru-6fby", "summary": "Access of Uninitialized Pointer\nA flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16371", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16373", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16267", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16222", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16093", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16315", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16285", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16318", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16392", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17756", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17976", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17804", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1368" }, { "reference_url": "https://github.com/uclouvain/openjpeg/pull/1369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/pull/1369" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067052", "reference_id": "2067052", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067052" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1122", "reference_id": "CVE-2022-1122", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1122" }, { "reference_url": "https://security.gentoo.org/glsa/202209-04", "reference_id": "GLSA-202209-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7645", "reference_id": "RHSA-2022:7645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8207", "reference_id": "RHSA-2022:8207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8207" }, { "reference_url": "https://usn.ubuntu.com/7083-1/", "reference_id": "USN-7083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7083-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053920?format=api", "purl": "pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2" } ], "aliases": [ "CVE-2022-1122" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xh3j-ufru-6fby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82454?format=api", "vulnerability_id": "VCID-xvjg-5z4m-pqdv", "summary": "openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20847", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72736", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72639", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7263", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72685", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72649", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72675", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72728", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72548", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.7259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00724", "scoring_system": "epss", "scoring_elements": "0.72642", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72847", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728509", "reference_id": "1728509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728509" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294", "reference_id": "931294", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-20847" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xvjg-5z4m-pqdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40224?format=api", "vulnerability_id": "VCID-yb58-a8p7-v7dw", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74999", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74923", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74941", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74994", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74843", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74822", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74855", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74846", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74882", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74889", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74893", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74899", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74927", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00846", "scoring_system": "epss", "scoring_elements": "0.74951", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755769", "reference_id": "1755769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755769" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553", "reference_id": "939553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-21010", "reference_id": "CVE-2018-21010", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-21010" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-21010" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yb58-a8p7-v7dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93803?format=api", "vulnerability_id": "VCID-z1a1-p95p-sya2", "summary": "An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68265", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68281", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68362", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68369", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68408", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68413", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68417", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68394", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68437", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68473", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68464", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68521", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68532", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-7648" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a1-p95p-sya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40241?format=api", "vulnerability_id": "VCID-zgaa-57ak-jbex", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29418", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29329", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29457", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29387", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29308", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523", "reference_id": "1907523", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845", "reference_id": "CVE-2020-27845", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27845" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgaa-57ak-jbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83180?format=api", "vulnerability_id": "VCID-zz9f-brcy-ekdy", "summary": "openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61646", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61488", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61771", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61834", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61788", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61817", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61872", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61886", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61787", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6177", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61724", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626088", "reference_id": "1626088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626088" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2018-16375" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz9f-brcy-ekdy" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80758?format=api", "vulnerability_id": "VCID-2ad2-5t5w-d7ew", "summary": "openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35008", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35403", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35092", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35003", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34882", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34954", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34991", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34894", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34921", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.5088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50934", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723", "reference_id": "1905723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824", "reference_id": "CVE-2020-27824", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27824" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ad2-5t5w-d7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40238?format=api", "vulnerability_id": "VCID-3r1m-53dp-yff2", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29418", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29329", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29457", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29387", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29308", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513", "reference_id": "1907513", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842", "reference_id": "CVE-2020-27842", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27842" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27842" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1m-53dp-yff2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40236?format=api", "vulnerability_id": "VCID-4hbk-qsje-63fd", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3025", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30141", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30025", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.2995", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3039", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54033", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54154", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53991", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54089", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54047", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54073", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54141", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510", "reference_id": "1907510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907510" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841", "reference_id": "CVE-2020-27841", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27841" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27841" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4hbk-qsje-63fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60044?format=api", "vulnerability_id": "VCID-6m6f-5tup-pbay", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88881", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88894", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88901", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8891", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88927", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88939", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88933", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88942", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88961", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88972", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487376", "reference_id": "1487376", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487376" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-10506" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6m6f-5tup-pbay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81676?format=api", "vulnerability_id": "VCID-7ath-fa35-5uca", "summary": "openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80876", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80829", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80873", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80739", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80757", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80774", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80796", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80816", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80811", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511", "reference_id": "1790511", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790511" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000", "reference_id": "950000", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851", "reference_id": "CVE-2020-6851", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0262", "reference_id": "RHSA-2020:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0274", "reference_id": "RHSA-2020:0274", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0296", "reference_id": "RHSA-2020:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0296" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-6851" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ath-fa35-5uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63485?format=api", "vulnerability_id": "VCID-7vw2-fcqu-8bae", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77949", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77967", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.7796", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.77992", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.78", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.78013", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.78022", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01089", "scoring_system": "epss", "scoring_elements": "0.7805", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01146", "scoring_system": "epss", "scoring_elements": "0.78595", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01146", "scoring_system": "epss", "scoring_elements": "0.78592", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01146", "scoring_system": "epss", "scoring_elements": "0.78608", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01146", "scoring_system": "epss", "scoring_elements": "0.78645", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01146", "scoring_system": "epss", "scoring_elements": "0.78659", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389", "reference_id": "1487389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431", "reference_id": "874431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14152" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vw2-fcqu-8bae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58966?format=api", "vulnerability_id": "VCID-drgt-8maa-xqgv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.7697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76984", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.76996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77067", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77087", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77096", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77126", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77147", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77135", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77152", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.772", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01001", "scoring_system": "epss", "scoring_elements": "0.77215", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213", "reference_id": "1372213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372213" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1854", "reference_id": "RHSA-2016:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-5152" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drgt-8maa-xqgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=api", "vulnerability_id": "VCID-e76r-pz11-yfhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70686", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70674", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7053", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7055", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7059", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70623", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70593", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7062", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571480" }, { "reference_url": "https://codereview.chromium.org/1583233008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1583233008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156", "reference_id": "1306156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626", "reference_id": "CVE-2016-1626", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1626" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60048?format=api", "vulnerability_id": "VCID-eavm-6anm-nfgu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73752", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73767", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73776", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.738", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7381", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73803", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73829", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73854", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73817", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.7384", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73897", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73904", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418147", "reference_id": "1418147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418147" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551", "reference_id": "844551", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-9112" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eavm-6anm-nfgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83807?format=api", "vulnerability_id": "VCID-fc33-x3z3-tyde", "summary": "openjpeg: Stack-buffer overflow in the pgxtoimage function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90212", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90187", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90182", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.9019", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90203", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90094", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90136", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90151", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.9015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.9016", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05391", "scoring_system": "epss", "scoring_elements": "0.90176", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1044" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525086", "reference_id": "1525086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525086" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17479", "reference_id": "CVE-2017-17479", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17479" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-17479" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc33-x3z3-tyde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60060?format=api", "vulnerability_id": "VCID-fq9r-fneu-1fhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71723", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71667", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71732", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71603", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71611", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71601", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71636", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71671", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71638", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768", "reference_id": "1487768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118", "reference_id": "874118", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14039" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9r-fneu-1fhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70432?format=api", "vulnerability_id": "VCID-j8et-rm1k-xkhg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71695", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71701", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71682", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71737", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71742", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71727", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71761", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71794", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.7176", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71788", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71846", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71854", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537758", "reference_id": "1537758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537758" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533", "reference_id": "888533", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-5785" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8et-rm1k-xkhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60054?format=api", "vulnerability_id": "VCID-jayn-yzet-k7g5", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.68048", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67979", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.68036", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.6789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67913", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.679", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67928", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67954", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231", "reference_id": "1390231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390231" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557", "reference_id": "844557", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557" }, { "reference_url": "https://security.archlinux.org/AVG-54", "reference_id": "AVG-54", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-54" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-9118" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jayn-yzet-k7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=api", "vulnerability_id": "VCID-jqup-3gmb-mqbh", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75985", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75971", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75715", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75839", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75849", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7586", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75868", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75897", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75921", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75906", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7592", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571479" }, { "reference_url": "https://codereview.chromium.org/1590593002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1590593002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.debian.org/security/2017/dsa-4013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-4013" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577", "reference_id": "1310577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628", "reference_id": "CVE-2016-1628", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-1628" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63484?format=api", "vulnerability_id": "VCID-jvtx-fv51-5bbe", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75804", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.7923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01236", "scoring_system": "epss", "scoring_elements": "0.79232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79817", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79824", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01304", "scoring_system": "epss", "scoring_elements": "0.79839", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80375", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80419", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80324", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80346", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80363", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80358", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01372", "scoring_system": "epss", "scoring_elements": "0.80415", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347", "reference_id": "1487347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487347" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115", "reference_id": "874115", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14041" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtx-fv51-5bbe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40229?format=api", "vulnerability_id": "VCID-kq91-13ek-rkcu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57063", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56986", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57048", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5695", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56968", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56948", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57009", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56961", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869", "reference_id": "1852869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220", "reference_id": "965220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389", "reference_id": "CVE-2020-15389", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15389" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-15389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kq91-13ek-rkcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70431?format=api", "vulnerability_id": "VCID-kt1c-6859-v3ej", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88252", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88429", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88381", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8838", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88392", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8842", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.8828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88306", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88319", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88336", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88341", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88342", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88353", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03921", "scoring_system": "epss", "scoring_elements": "0.88369", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1044" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4405" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525088", "reference_id": "1525088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525088" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738", "reference_id": "884738", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17480", "reference_id": "CVE-2017-17480", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17480" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-17480" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt1c-6859-v3ej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81602?format=api", "vulnerability_id": "VCID-mdhg-k4sr-3bg7", "summary": "openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82953", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82908", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82945", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8276", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.8282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82828", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82834", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82854", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82895", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01793", "scoring_system": "epss", "scoring_elements": "0.82893", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535", "reference_id": "1800535", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184", "reference_id": "950184", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112", "reference_id": "CVE-2020-8112", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0550", "reference_id": "RHSA-2020:0550", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0550" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0569", "reference_id": "RHSA-2020:0569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0570", "reference_id": "RHSA-2020:0570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0570" }, { "reference_url": "https://usn.ubuntu.com/4497-1/", "reference_id": "USN-4497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4497-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-8112" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdhg-k4sr-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60059?format=api", "vulnerability_id": "VCID-ndpq-xye2-tugw", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60953", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60832", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60845", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60838", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60788", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60835", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60893", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60854", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60881", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60939", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62252", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62177", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487236", "reference_id": "1487236", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487236" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://usn.ubuntu.com/USN-4782-1/", "reference_id": "USN-USN-4782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4782-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-12982" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndpq-xye2-tugw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70433?format=api", "vulnerability_id": "VCID-rm5x-1fp6-mfau", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23781", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23817", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23697", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23608", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23559", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23578", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23667", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2358", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2346", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2354", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24093", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542321", "reference_id": "1542321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542321" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683", "reference_id": "889683", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-6616" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm5x-1fp6-mfau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70434?format=api", "vulnerability_id": "VCID-tgph-8x71-qbc2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.82001", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81934", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81951", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.8176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81795", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81835", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81859", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81874", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81891", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81912", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81937", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1123" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4405" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609909", "reference_id": "1609909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609909" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873", "reference_id": "904873", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14423", "reference_id": "CVE-2018-14423", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14423" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-14423" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgph-8x71-qbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70435?format=api", "vulnerability_id": "VCID-ttzh-p89a-mkar", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.7118", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71209", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71248", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71255", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71259", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71279", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71314", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71277", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71305", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71361", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71371", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638558", "reference_id": "1638558", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638558" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763", "reference_id": "910763", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763" }, { "reference_url": "https://usn.ubuntu.com/4109-1/", "reference_id": "USN-4109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4109-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2018-18088" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttzh-p89a-mkar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40231?format=api", "vulnerability_id": "VCID-u497-trj1-rfdj", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43752", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4362", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43624", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43541", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43674", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44722", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.448", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44652", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44737", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44678", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44707", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.4478", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/1283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/1283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998", "reference_id": "1901998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814", "reference_id": "CVE-2020-27814", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27814" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27814" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u497-trj1-rfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63483?format=api", "vulnerability_id": "VCID-uzpe-dvyu-ckfc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00876", "scoring_system": "epss", "scoring_elements": "0.7534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76235", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76173", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76221", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76049", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76088", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76098", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76109", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76118", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76149", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7617", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76157", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361", "reference_id": "1487361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487361" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117", "reference_id": "874117", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035809?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.0-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-454c-fk3j-g7aa" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-4qgw-3tgj-4kas" }, { "vulnerability": "VCID-5x4u-vqvr-bfhw" }, { "vulnerability": "VCID-6fte-2hrw-z3eb" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-8ruh-x3eq-rffk" }, { "vulnerability": "VCID-9ezw-mty9-z3cv" }, { "vulnerability": "VCID-9f84-54j5-abbf" }, { "vulnerability": "VCID-9sk8-qkrw-5bdj" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-bxq4-958j-gybu" }, { "vulnerability": "VCID-c6g2-dknk-u3cy" }, { "vulnerability": "VCID-cgjw-v1jx-1qg3" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-cmhu-2x4c-pqfk" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-dvse-ce3w-p7da" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jpxx-3mbf-pyhe" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-jwrz-ypan-9bg6" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-t76s-q45b-9ff7" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-txsw-c8hq-suaj" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-ubrj-hty6-c3cc" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-vt59-h7ax-7uca" }, { "vulnerability": "VCID-vxw5-nm1p-q3d5" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.0-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037050?format=api", "purl": "pkg:deb/debian/openjpeg2@2.1.2-1.1%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-6m6f-5tup-pbay" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-7vw2-fcqu-8bae" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-drgt-8maa-xqgv" }, { "vulnerability": "VCID-e76r-pz11-yfhu" }, { "vulnerability": "VCID-eavm-6anm-nfgu" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-fc33-x3z3-tyde" }, { "vulnerability": "VCID-fq9r-fneu-1fhu" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-j8et-rm1k-xkhg" }, { "vulnerability": "VCID-jayn-yzet-k7g5" }, { "vulnerability": "VCID-jqup-3gmb-mqbh" }, { "vulnerability": "VCID-jvtx-fv51-5bbe" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-kt1c-6859-v3ej" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-ndpq-xye2-tugw" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-rm5x-1fp6-mfau" }, { "vulnerability": "VCID-tgph-8x71-qbc2" }, { "vulnerability": "VCID-ttzh-p89a-mkar" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-uzpe-dvyu-ckfc" }, { "vulnerability": "VCID-wc6r-1t2c-9qdp" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zmh5-86mb-yqde" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14040" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzpe-dvyu-ckfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60042?format=api", "vulnerability_id": "VCID-wc6r-1t2c-9qdp", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90883", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90865", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90877", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90756", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90783", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90791", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90817", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90812", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90829", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90847", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90858", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06106", "scoring_system": "epss", "scoring_elements": "0.90856", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10504" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487369", "reference_id": "1487369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487369" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113", "reference_id": "874113", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113" }, { "reference_url": "https://github.com/uclouvain/openjpeg/issues/835", "reference_id": "CVE-2016-10504", "reference_type": "exploit", "scores": [], "url": "https://github.com/uclouvain/openjpeg/issues/835" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt", "reference_id": "CVE-2016-10504", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2016-10504" ], "risk_score": 9.4, "exploitability": "2.0", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wc6r-1t2c-9qdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80759?format=api", "vulnerability_id": "VCID-whsh-5urk-b3ap", "summary": "openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13963", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14086", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1618", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16372", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16065", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16288", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16258", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16291", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16365", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762", "reference_id": "1905762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762" }, { "reference_url": "https://security.archlinux.org/AVG-1980", "reference_id": "AVG-1980", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1980" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823", "reference_id": "CVE-2020-27823", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27823" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whsh-5urk-b3ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40239?format=api", "vulnerability_id": "VCID-xc4v-2aa6-yfd6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32515", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32432", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32498", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3277", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32657", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32573", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32497", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32507", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3241", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516", "reference_id": "1907516", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663", "reference_id": "983663", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843", "reference_id": "CVE-2020-27843", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27843" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27843" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xc4v-2aa6-yfd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40241?format=api", "vulnerability_id": "VCID-zgaa-57ak-jbex", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29418", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29329", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29457", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29387", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29308", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523", "reference_id": "1907523", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523" }, { "reference_url": "https://security.archlinux.org/ASA-202012-21", "reference_id": "ASA-202012-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-21" }, { "reference_url": "https://security.archlinux.org/AVG-1339", "reference_id": "AVG-1339", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1339" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845", "reference_id": "CVE-2020-27845", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27845" }, { "reference_url": "https://security.gentoo.org/glsa/202101-29", "reference_id": "GLSA-202101-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4251", "reference_id": "RHSA-2021:4251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4251" }, { "reference_url": "https://usn.ubuntu.com/4685-1/", "reference_id": "USN-4685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4685-1/" }, { "reference_url": "https://usn.ubuntu.com/4686-1/", "reference_id": "USN-4686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4686-1/" }, { "reference_url": "https://usn.ubuntu.com/4880-1/", "reference_id": "USN-4880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4880-1/" }, { "reference_url": "https://usn.ubuntu.com/5952-1/", "reference_id": "USN-5952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051795?format=api", "purl": "pkg:deb/debian/openjpeg2@2.4.0-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-58rn-wzfp-1kaz" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-xh3j-ufru-6fby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3" } ], "aliases": [ "CVE-2020-27845" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgaa-57ak-jbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84045?format=api", "vulnerability_id": "VCID-zmh5-86mb-yqde", "summary": "openjpeg: Heap-based buffer overflow in opj_mqc_flush in mqc.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14151", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75834", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.7585", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75835", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75874", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75883", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75894", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75932", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00958", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00958", "scoring_system": "epss", "scoring_elements": "0.76555", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00958", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00958", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00958", "scoring_system": "epss", "scoring_elements": "0.76637", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487390", "reference_id": "1487390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430", "reference_id": "874430", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038125?format=api", "purl": "pkg:deb/debian/openjpeg2@2.3.0-2%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z5a-aa47-dyft" }, { "vulnerability": "VCID-2272-j2kp-x3du" }, { "vulnerability": "VCID-2ad2-5t5w-d7ew" }, { "vulnerability": "VCID-3r1m-53dp-yff2" }, { "vulnerability": "VCID-4hbk-qsje-63fd" }, { "vulnerability": "VCID-7ath-fa35-5uca" }, { "vulnerability": "VCID-an46-hxt9-57e1" }, { "vulnerability": "VCID-cgvq-jt8a-4yba" }, { "vulnerability": "VCID-ecez-3pwt-pudf" }, { "vulnerability": "VCID-hxax-t3zc-8kax" }, { "vulnerability": "VCID-k9dc-cxnp-nug2" }, { "vulnerability": "VCID-kq91-13ek-rkcu" }, { "vulnerability": "VCID-mdhg-k4sr-3bg7" }, { "vulnerability": "VCID-pzv2-p44c-8qg4" }, { "vulnerability": "VCID-qyq1-1npp-yyb4" }, { "vulnerability": "VCID-u497-trj1-rfdj" }, { "vulnerability": "VCID-whsh-5urk-b3ap" }, { "vulnerability": "VCID-xc4v-2aa6-yfd6" }, { "vulnerability": "VCID-xh3j-ufru-6fby" }, { "vulnerability": "VCID-xvjg-5z4m-pqdv" }, { "vulnerability": "VCID-yb58-a8p7-v7dw" }, { "vulnerability": "VCID-z1a1-p95p-sya2" }, { "vulnerability": "VCID-zgaa-57ak-jbex" }, { "vulnerability": "VCID-zz9f-brcy-ekdy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" } ], "aliases": [ "CVE-2017-14151" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh5-86mb-yqde" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%252Bdeb10u2" }