{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","type":"alpm","namespace":"archlinux","name":"jasper","version":"1.900.5-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.900.20-1","latest_non_vulnerable_version":"2.0.28-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48600?format=json","vulnerability_id":"VCID-273p-y942-ekes","summary":"Multiple memory management errors in JasPer could result in\n    execution of arbitrary code or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4517","reference_id":"","reference_type":"","scores":[{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.9744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97448","published_at":"2026-04-16T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97459","published_at":"2026-05-05T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97466","published_at":"2026-05-09T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97474","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html","reference_id":"071458.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html","reference_id":"071561.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html"},{"reference_url":"http://secunia.com/advisories/47193","reference_id":"47193","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47193"},{"reference_url":"http://secunia.com/advisories/47306","reference_id":"47306","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47306"},{"reference_url":"http://secunia.com/advisories/47353","reference_id":"47353","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47353"},{"reference_url":"http://www.securityfocus.com/bid/50992","reference_id":"50992","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.securityfocus.com/bid/50992"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71701","reference_id":"71701","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726","reference_id":"747726","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726"},{"reference_url":"http://osvdb.org/77596","reference_id":"77596","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://osvdb.org/77596"},{"reference_url":"http://www.kb.cert.org/vuls/id/887409","reference_id":"887409","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.kb.cert.org/vuls/id/887409"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html","reference_id":"cpujan2012-366304.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"},{"reference_url":"http://www.debian.org/security/2011/dsa-2371","reference_id":"dsa-2371","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.debian.org/security/2011/dsa-2371"},{"reference_url":"https://security.gentoo.org/glsa/201201-10","reference_id":"GLSA-201201-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-10"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1807","reference_id":"RHSA-2011:1807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1807"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1807.html","reference_id":"RHSA-2011-1807.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2011-1807.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1811","reference_id":"RHSA-2011:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1811"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1811.html","reference_id":"RHSA-2011-1811.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2011-1811.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1315-1/","reference_id":"USN-1315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1315-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-1315-1","reference_id":"USN-1315-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.ubuntu.com/usn/USN-1315-1"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2011-4517"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-273p-y942-ekes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48599?format=json","vulnerability_id":"VCID-2hkv-yn4v-6kcy","summary":"Multiple memory management errors in JasPer could result in\n    execution of arbitrary code or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4516","reference_id":"","reference_type":"","scores":[{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97738","published_at":"2026-05-12T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.9769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.9771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.9772","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97726","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97731","published_at":"2026-05-07T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97733","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726","reference_id":"747726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://security.gentoo.org/glsa/201201-10","reference_id":"GLSA-201201-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1807","reference_id":"RHSA-2011:1807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1811","reference_id":"RHSA-2011:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1315-1/","reference_id":"USN-1315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1315-1/"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2011-4516"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hkv-yn4v-6kcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81451?format=json","vulnerability_id":"VCID-6qcp-9kba-1khz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1867.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1867","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67675","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67619","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67642","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6765","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67599","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6759","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67609","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3785","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3785"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/13/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/13/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/13/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/13/6"},{"reference_url":"http://www.securityfocus.com/bid/81488","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81488"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298135","reference_id":"1298135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298135"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1867","reference_id":"CVE-2016-1867","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1208","reference_id":"RHSA-2017:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1208"},{"reference_url":"https://usn.ubuntu.com/3295-1/","reference_id":"USN-3295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3295-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2016-1867"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qcp-9kba-1khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48761?format=json","vulnerability_id":"VCID-932v-xwug-nbfy","summary":"Multiple memory management errors in JasPer might lead to execution of\n    arbitrary code via jpeg2k files.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=222819","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=222819"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3520","reference_id":"","reference_type":"","scores":[{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86664","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86652","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.8653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520"},{"reference_url":"http://secunia.com/advisories/33173","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33173"},{"reference_url":"http://secunia.com/advisories/34391","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34391"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45621","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45621"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html"},{"reference_url":"http://www.securityfocus.com/bid/31470","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31470"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-742-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-742-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=461476","reference_id":"461476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=461476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778","reference_id":"559778","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3520","reference_id":"CVE-2008-3520","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3520"},{"reference_url":"https://security.gentoo.org/glsa/200812-18","reference_id":"GLSA-200812-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0012","reference_id":"RHSA-2009:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"},{"reference_url":"https://usn.ubuntu.com/742-1/","reference_id":"USN-742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/742-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2008-3520"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-932v-xwug-nbfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58477?format=json","vulnerability_id":"VCID-9kqw-qv6w-zugt","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0514.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0514.html"},{"reference_url":"http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9029","reference_id":"","reference_type":"","scores":[{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96835","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96861","published_at":"2026-04-11T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.9687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.9689","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.96894","published_at":"2026-05-07T12:55:00Z"},{"value":"0.32606","scoring_system":"epss","scoring_elements":"0.969","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029"},{"reference_url":"http://secunia.com/advisories/61747","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61747"},{"reference_url":"http://secunia.com/advisories/62828","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62828"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/99125","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/99125"},{"reference_url":"http://www.debian.org/security/2014/dsa-3089","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3089"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:247","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:247"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159"},{"reference_url":"http://www.ocert.org/advisories/ocert-2014-009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2014-009.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/12/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/12/04/9"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/archive/1/534153/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/534153/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/71476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71476"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2434-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2434-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2434-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2434-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1167537","reference_id":"1167537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1167537"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9029","reference_id":"CVE-2014-9029","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9029"},{"reference_url":"https://security.gentoo.org/glsa/201503-01","reference_id":"GLSA-201503-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:2021","reference_id":"RHSA-2014:2021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:2021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/2434-1/","reference_id":"USN-2434-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2434-1/"},{"reference_url":"https://usn.ubuntu.com/2434-2/","reference_id":"USN-2434-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2434-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2014-9029"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9kqw-qv6w-zugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58081?format=json","vulnerability_id":"VCID-ckw2-w524-k3gz","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0539.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html"},{"reference_url":"http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1713.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1713.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8138","reference_id":"","reference_type":"","scores":[{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90656","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90586","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90608","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90618","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90646","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05895","scoring_system":"epss","scoring_elements":"0.90659","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138"},{"reference_url":"http://secunia.com/advisories/61747","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61747"},{"reference_url":"http://secunia.com/advisories/62311","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62311"},{"reference_url":"http://secunia.com/advisories/62615","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62615"},{"reference_url":"http://secunia.com/advisories/62619","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62619"},{"reference_url":"https://www.ocert.org/advisories/ocert-2014-012.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.ocert.org/advisories/ocert-2014-012.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3106","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3106"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:012"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159"},{"reference_url":"http://www.securityfocus.com/bid/71746","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71746"},{"reference_url":"http://www.securitytracker.com/id/1033459","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033459"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2483-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2483-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2483-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2483-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173162","reference_id":"1173162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173162"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8138","reference_id":"CVE-2014-8138","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8138"},{"reference_url":"https://security.gentoo.org/glsa/201503-01","reference_id":"GLSA-201503-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:2021","reference_id":"RHSA-2014:2021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:2021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1713","reference_id":"RHSA-2015:1713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1713"},{"reference_url":"https://usn.ubuntu.com/2483-1/","reference_id":"USN-2483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-1/"},{"reference_url":"https://usn.ubuntu.com/2483-2/","reference_id":"USN-2483-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2014-8138"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckw2-w524-k3gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85551?format=json","vulnerability_id":"VCID-dfkc-hyp3-6kbd","summary":"jasper: use-after-free and double-free flaws in mif_process_cmpt()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5221.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5221","reference_id":"","reference_type":"","scores":[{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45562","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45576","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45594","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45536","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50182","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5221"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1255710","reference_id":"1255710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1255710"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1208","reference_id":"RHSA-2017:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1208"},{"reference_url":"https://usn.ubuntu.com/3693-1/","reference_id":"USN-3693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3693-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2015-5221"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfkc-hyp3-6kbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58080?format=json","vulnerability_id":"VCID-f3xd-54ke-1bf6","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0539.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html"},{"reference_url":"http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-2021.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1713.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1713.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8137.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8137","reference_id":"","reference_type":"","scores":[{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96824","published_at":"2026-05-12T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96818","published_at":"2026-05-11T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96777","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.9678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96782","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96795","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96807","published_at":"2026-05-05T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.31457","scoring_system":"epss","scoring_elements":"0.96816","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138"},{"reference_url":"http://secunia.com/advisories/61747","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61747"},{"reference_url":"http://secunia.com/advisories/62311","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62311"},{"reference_url":"http://secunia.com/advisories/62615","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62615"},{"reference_url":"http://secunia.com/advisories/62619","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62619"},{"reference_url":"https://www.ocert.org/advisories/ocert-2014-012.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.ocert.org/advisories/ocert-2014-012.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3106","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3106"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:012"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:159"},{"reference_url":"http://www.securityfocus.com/bid/71742","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71742"},{"reference_url":"http://www.securitytracker.com/id/1033459","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033459"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2483-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2483-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2483-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2483-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173157","reference_id":"1173157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173157"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8137","reference_id":"CVE-2014-8137","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8137"},{"reference_url":"https://security.gentoo.org/glsa/201503-01","reference_id":"GLSA-201503-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:2021","reference_id":"RHSA-2014:2021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:2021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1713","reference_id":"RHSA-2015:1713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1713"},{"reference_url":"https://usn.ubuntu.com/2483-1/","reference_id":"USN-2483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-1/"},{"reference_url":"https://usn.ubuntu.com/2483-2/","reference_id":"USN-2483-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2014-8137"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f3xd-54ke-1bf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58082?format=json","vulnerability_id":"VCID-m85g-54qv-h3at","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8157.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8157","reference_id":"","reference_type":"","scores":[{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90525","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90527","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90544","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90582","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90594","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05821","scoring_system":"epss","scoring_elements":"0.90591","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179282","reference_id":"1179282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179282"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://security.gentoo.org/glsa/201503-01","reference_id":"GLSA-201503-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0074","reference_id":"RHSA-2015:0074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/2483-1/","reference_id":"USN-2483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-1/"},{"reference_url":"https://usn.ubuntu.com/2483-2/","reference_id":"USN-2483-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2014-8157"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m85g-54qv-h3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48762?format=json","vulnerability_id":"VCID-tqtm-achn-z3fg","summary":"Multiple memory management errors in JasPer might lead to execution of\n    arbitrary code via jpeg2k files.","references":[{"reference_url":"http://bugs.gentoo.org/attachment.cgi?id=163282&action=view","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/attachment.cgi?id=163282&action=view"},{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=222819","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=222819"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3522","reference_id":"","reference_type":"","scores":[{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88872","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.8882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88817","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88848","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88865","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88877","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522"},{"reference_url":"http://secunia.com/advisories/33173","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33173"},{"reference_url":"http://secunia.com/advisories/34391","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34391"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45623","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45623"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164"},{"reference_url":"http://www.securityfocus.com/bid/31470","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31470"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-742-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-742-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=461478","reference_id":"461478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=461478"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778","reference_id":"559778","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3522","reference_id":"CVE-2008-3522","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3522"},{"reference_url":"https://security.gentoo.org/glsa/200812-18","reference_id":"GLSA-200812-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"},{"reference_url":"https://usn.ubuntu.com/742-1/","reference_id":"USN-742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/742-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2008-3522"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqtm-achn-z3fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58083?format=json","vulnerability_id":"VCID-yqjj-75r1-b3ht","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8158","reference_id":"","reference_type":"","scores":[{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90965","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90827","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.9088","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90912","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90927","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90944","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90957","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06219","scoring_system":"epss","scoring_elements":"0.90955","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179298","reference_id":"1179298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179298"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://security.gentoo.org/glsa/201503-01","reference_id":"GLSA-201503-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0074","reference_id":"RHSA-2015:0074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/2483-1/","reference_id":"USN-2483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-1/"},{"reference_url":"https://usn.ubuntu.com/2483-2/","reference_id":"USN-2483-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2483-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371600?format=json","purl":"pkg:alpm/archlinux/jasper@1.900.5-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}],"aliases":["CVE-2014-8158"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqjj-75r1-b3ht"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jasper@1.900.5-1"}