{"url":"http://public2.vulnerablecode.io/api/packages/113554?format=json","purl":"pkg:rpm/redhat/openjpeg@1.5.1-16?arch=el7_3","type":"rpm","namespace":"redhat","name":"openjpeg","version":"1.5.1-16","qualifiers":{"arch":"el7_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58975?format=json","vulnerability_id":"VCID-6fte-2hrw-z3eb","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5158","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73313","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73305","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73336","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73393","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.734","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73408","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372219","reference_id":"1372219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372219"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-5158"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fte-2hrw-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80952?format=json","vulnerability_id":"VCID-8ruh-x3eq-rffk","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7163","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66432","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.6641","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.6642","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66316","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66331","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66351","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374329","reference_id":"1374329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374329"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604","reference_id":"837604","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-7163"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ruh-x3eq-rffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60056?format=json","vulnerability_id":"VCID-c6g2-dknk-u3cy","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9573","reference_id":"","reference_type":"","scores":[{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.7758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.7766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77708","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77721","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77751","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77769","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77759","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77777","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77822","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77845","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402711","reference_id":"1402711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402711"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422","reference_id":"851422","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-9573"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6g2-dknk-u3cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58950?format=json","vulnerability_id":"VCID-cmhu-2x4c-pqfk","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5139","reference_id":"","reference_type":"","scores":[{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.80971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.8098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81054","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81071","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81108","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81122","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81144","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81166","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81162","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.8118","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81221","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81229","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363982","reference_id":"1363982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363982"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1580","reference_id":"RHSA-2016:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-5139"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmhu-2x4c-pqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84883?format=json","vulnerability_id":"VCID-h4gt-xqjb-f7ax","summary":"openjpeg: incorrect fix for CVE-2013-6045","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9675.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9675","reference_id":"","reference_type":"","scores":[{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7404","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74064","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74112","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74074","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74097","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74154","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74159","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74167","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382202","reference_id":"1382202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-9675"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h4gt-xqjb-f7ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58977?format=json","vulnerability_id":"VCID-ubrj-hty6-c3cc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5159","reference_id":"","reference_type":"","scores":[{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80879","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.8092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80976","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80999","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81021","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81016","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81034","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81076","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81081","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.81085","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372220","reference_id":"1372220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372220"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[],"aliases":["CVE-2016-5159"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubrj-hty6-c3cc"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openjpeg@1.5.1-16%3Farch=el7_3"}